1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
romanna [79]
3 years ago
7

Virtual Memory involves swapping between which 2 devices?

Computers and Technology
1 answer:
Darina [25.2K]3 years ago
6 0

Answer:

Ram and the hard drive

Explanation:

A page of RAM is written to the harddisk and read back when it is needed again. That way it may seem you have more RAM than you actually have, at the cost of performance of course.

You might be interested in
"Memory refers to: A.the brain processes involved in the encoding, storage, and retrieval of information. B.the mechanisms drivi
natali 33 [55]

Answer: A

Explain:

you can use memory on a computer to retrieve passed data if your referring to brains memory that is memory of passed events

memory:1 the faculity by which the mind stores and members information

2 something remembered from the past a recollection

8 0
3 years ago
which of the following present the most significant obstacle to developing IT security if we consider commerce and marketing?
Dmitry_Shevchenko [17]

Answer:

There is no direct return on investment in building security systems.

Security systems are detrimental to usability and can make IT systems less functional, and therefore less attractive to the customer.

There is pressure to reduce the time it takes to get a new IT product or system onto the market, so security systems are sacrificed in order to reduce the time-to-market.

Explanation:

Cyber security has always been challenging for the organizations. There have been groups which are always looking for loop holes in cyber security and hacks the details and asks the ransom to restore. IT systems have now been more complex in this era. Users are increasing every new day and network accounts security is more demanding. Computer connection are more complex and require special attention to control them. The obstacles in IT systems are of concern as there is need for dynamic IT solution to counter the challenging hackers.  New programs and customized demand of IT systems need customized IT security systems.

4 0
2 years ago
If you need to change the typeface of a document, which menu will you choose?
Nezavi [6.7K]

Format menu

Format menu is used to change typeface of a document

6 0
2 years ago
Jean-Ann works in the finance business. She analyzes insurance applications in order to determine the level of risk involved in
Tamiku [17]

Answer:

She works as a insurance or tech applicator

Explanation:

5 0
3 years ago
Nathan notices his computer System is slowing down when he tries to copy documents to it he also gets a prompt I warned him that
galina1969 [7]

Answer:Hard drive or Solid State drive

Explanation:

5 0
3 years ago
Other questions:
  • An email message form includes all of the following main areas except
    11·2 answers
  • What is word processing and word wrap?
    5·1 answer
  • What is the name of the file manager in Microsoft Windows. The file manager used in Microsoft Windows is?
    12·2 answers
  • 0x400C (in hexadecimal)?
    8·1 answer
  • If a code word is defined to be a sequence of different letters chosen from the 10 letters A, B, C, D, E, F, G, H, I, and J, wha
    15·1 answer
  • Read each statement below. If the statement describes a peer-to-peer network, put a P next to it. If the statement describes a s
    12·1 answer
  • * 8) Embedded operating systems are specialized software meant only to manage the
    7·1 answer
  • Why would you use a computer's secondary memory?
    12·1 answer
  • If you select one slice of pie in a pie chart, you have selected a ____
    13·2 answers
  • What was the name of the first computer, developed by charles babbage?.
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!