1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sati [7]
3 years ago
14

Which daemon manages the physical memory by moving process from physical memory to swap space when more physical memory is neede

d
Computers and Technology
1 answer:
Anastasy [175]3 years ago
6 0

Answer:

Swap daemon

Explanation:

Swap daemon manages the physical memory by moving process from physical memory to swap space when more physical memory is needed. The main function of the swap daemon is to monitor processes running on a computer to determine whether or not it requires to be swapped.

The physical memory of a computer system is known as random access memory (RAM).

A random access memory (RAM) can be defined as the internal hardware memory which allows data to be read and written (changed) in a computer.Basically, a random access memory (RAM) is used for temporarily storing data such as software programs, operating system (OS),machine code and working data (data in current use) so that they are easily and rapidly accessible to the central processing unit (CPU).

Additionally, RAM is a volatile memory because any data stored in it would be lost or erased once the computer is turned off. Thus, it can only retain data while the computer is turned on and as such is considered to be a short-term memory.

There are two (2) main types of random access memory (RAM) and these are;

1. Static Random Access Memory (SRAM).

2. Dynamic Random Access Memory (DRAM).

You might be interested in
Linda is training to become a certified network design expert and consultant. While researching about the process of cellular ra
mel-nik [20]

Answer:

a. The cell tower forwards the call to the wireless provider's Mobile Telephone Switching Office

Explanation:

When a cell phone user begins to make a call, it is picked up by the cell tower located in the cell in which the cell phone is located and that belongs to the user's wireless provider. The next step in this process is that the cell tower forwards the call to the wireless provider's Mobile Telephone Switching Office.

8 0
3 years ago
Which is one is bigger 326 kb or 60,436 kb?
Nitella [24]

60,436 is larger.

A byte is a sequence of 8 bits (enough to represent one alphanumeric character) processed as a single unit of information. A single letter or character would use one byte of memory (8 bits), two characters would use two bytes (16 bits).

7 0
3 years ago
Read 2 more answers
Eq-20 why is the height of a vhf radio antenna important
masya89 [10]
Reasons why the height of a VHF radio antenna is important is because VHF radios work by the line of sight principle.
Line of sight
its a line from observers eye to a distant point.its a line between two points specifically the straight path between a transmitting antenna (as for radio or television signals) and receiving antenna when unobstructed by the horizon.
7 0
3 years ago
Read 2 more answers
The rangevalidator object on a web form has a type property for identifying the type of data for the range, such as ____.​
mojhsa [17]
<span>numbers,  dates, currency or strings - The range validator in a web form helps check whether the value entered in the field falls between the minimum and maximum values allowed in that field. For example if the type of data accepted  is of date type, then the rangevalidator checks whether the entered date falls within the given range. That means, month entered should be between 1 and 12, etc.</span>
8 0
3 years ago
Which of the following may present a problem for Linux users?
motikmotik
Tendancy to crash hope that helped
6 0
3 years ago
Read 2 more answers
Other questions:
  • A client computer networked to a server computer, with processing split between the two types of machines, is called a(n) ______
    12·1 answer
  • Triangle O N M is cut by line segment L K. Line segment L K goes from side N O to side N M. The length of N L is x, the length o
    8·2 answers
  • You have a hard disk that is formatted with the fat32 file system. you would like to implement file and folder permissions on th
    10·1 answer
  • Consider the following method: static void nPrint(String a, int n) { System.out.println(a.charAt(n)); } What potential error cou
    7·1 answer
  • Building relationships during your career exploration is called
    6·1 answer
  • You create a storyboard at the _____ stage of web development
    15·2 answers
  • You need to know the MAC address of a Windows 8 computer. How can you accomplish this?
    7·1 answer
  • Which of the following statements describes a good reason to use lossless audio compression?
    6·1 answer
  • Custom actions help your users by
    6·1 answer
  • In the Create Sparkline dialog, the _______ box refers to the cell range where you want the Sparklines to appear.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!