1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuri [45]
3 years ago
13

A client calls to complain that his computer starts up, but crashes when Windows starts to load. After a brief set of questions,

you find out that his nephew upgraded his RAM for him over the weekend and couldn't get the computer to work right. What could be the problem
Computers and Technology
1 answer:
melomori [17]3 years ago
5 0

Answer:

It may be that the amount of ram is not compatible with that computer, it may not support ram that is over 8 GB or higher, it may not be properly installed in the hardware, or the motherboard may not be able to read it.

Explanation:

Hardware and software is very unbalanced when it comes to new RAM being installed, as people complain about this exact same issue many times.

You might be interested in
What feature should you enable to prevent the sidhistory attribute from being used to falsely gain administrative privileges in
Katarina [22]

SID filtering enables to control of the sid history attribute from being utilized to falsely gain administrative privileges in a trusting forest.

<h3>What is  SID filtering?</h3>

SID filtering renders the domain controllers (DCs) in a trusting domain to remove all SIDs that aren't members of the trusted domain. In other words, if a user in a trusted domain exists as a member of groups in other domains in the forest, the trusting domain will withdraw those groups' SIDs from the user's access token.

For a newly set up trust between two domains or two forests, the SID Filtering exists activated by default. The filter extracts all foreign SIDs from the user's Access Token while accessing a resource through trust in a trusting domain.

SID filtering enables to control of the sidhistory attribute from being utilized to falsely gain administrative privileges in a trusting forest.

To learn more about SID filtering refer to:

brainly.com/question/23814085

#SPJ4

3 0
1 year ago
Any looping construct can be nested inside another loop is known as
Pavel [41]

Answer:

nested loop

pls mark me as brainliest

4 0
3 years ago
What happens in the process represented by the flowchart ?
Readme [11.4K]

Answer:

the person drinks water if the answer to “thirsty?” is yes

5 0
3 years ago
4. When you're working with a word processing document and you press the Del key, what happens?
Thepotemich [5.8K]
When you're working with a word processing document and you press the Del key, C. The entire document is deleted.

I have actually tried doing this to know which choice is the correct answer. I opened a new document, typed some words then pressed the Del key.... NOTHING HAPPENED! The character to the right of the cursor was not deleted, the entire document was not deleted, nor was the formatting style deleted.

I chose letter C because after seeing that nothing happened in an open document, I saved said document and opened the folder where the document was saved. I selected the document and pressed the Del key... a prompt appeared asking me if I was sure that I want to move my file to the Recycle Bin? I clicked yes... the entire document is deleted

7 0
3 years ago
Read 2 more answers
_________________________ are the countable products resulting from a program, while ________________________ are the changes in
garik1379 [7]

Answer: Outputs; Outcomes.

Explanation:

Program refers to the collection of instructions which the computer can execute in order to perform a certain task.

Outputs are are the countable products resulting from a program, while on the other hand, outcomes are the changes in clients that are achieved as a result of program participation.

8 0
2 years ago
Other questions:
  • Use the script below as a starting point to create a Rectangle class. Your rectangle class must have the following methods;A con
    12·1 answer
  • An expression that has correctly paired delimiters is called a(n)
    6·1 answer
  • Which relationship is possible when two tables share the same primary key? one-to-one one-to-many many-to-one many-to-many
    15·2 answers
  • What kind of information B2B SaaS companies wish to know about their competition, apart from information about their competitors
    15·1 answer
  • In one to two sentences, explain why citizens pay taxes
    8·1 answer
  • When you call a ____________ method, it executes statements it contains and then returns a value back to the program statement t
    6·2 answers
  • When searching for an image on your computer, you should look for a file with which of the following extensions?
    8·1 answer
  • Name two materials that we can burn in order to get energy from biomass
    9·1 answer
  • Your motherboard has sockets for 184-pin dimm ram. which type of ram should you install?
    15·1 answer
  • Which type of computer is used microprocessor​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!