1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tamiku [17]
3 years ago
8

5. If you upgrade the RAM (Random Access Memory) of you computer, what kind of enhancements will you notice? (Pick one or more c

hoices)
(A) My computer will become faster, if I am maxing out the computer memory usage.
(B) I will be able to store and save more data and files on the computer (Example: photos, videos, documents, movies and music)
(C) I will be able to open up and work on multiple applications and software on my computer simultaneously (without making the computer lagging and slow). I will be able to open multiple tabs on the browser.
(D) I will be able to randomly use my laptop anytime I want.
Computers and Technology
1 answer:
lana66690 [7]3 years ago
4 0
A

Random-access memory is a form of computer memory that can be read and changed in any order, typically used to store working data and machine code. A random-access memory device allows data items to be read or written in almost the same amount of time irrespective of the physical location of data inside the memory.

RAM allows your computer to perform many of its everyday tasks, such as loading applications, browsing the internet, editing a spreadsheet, or experiencing the latest game. Memory also allows you to switch quickly among these tasks, remembering where you are in one task when you switch to another task.
You might be interested in
Suppose I define some structure type ( studentInfo), then I declare an instance of it and I decide to also create a pointer to t
Nookie1986 [14]

Answer:

a. (p*Main).age = 20;

Explanation:

Pointers use ->

where as normal variable use . to access its members

pMain is the pointer.

*pMain is the value inside pMain.

pMain->age = 20;

This statement equals to

(*pMain).age = 20;

Answer is option a.

8 0
3 years ago
Cindy Vindoolo logged on to her e-mail account to find that she had received 50 e-mails from a company called LifeCo that promis
zmey [24]

Answer:

Option C i.e., spam is the correct answer to the following question.

Explanation:

The following mails are spam because when Cindy opens her mail account then, Cindy finds that she gets 50 emails from the unknown company which promises the weight loss if she will buy pills form that company named "LifeCo.". Cindy gets that these companies are fraud or they cheat so they deleted those messages angrily because those are spam.

5 0
4 years ago
Screenshot is the image of your active MS Word PowerPoint window<br>Is it true or false? ​
crimeas [40]

true

Screenshots are basically snapshots of your computer screen. You can take a screenshot of almost any program, website, or open window. PowerPoint makes it easy to insert a screenshot of an entire window or a screen clipping of part of a window in your presentation.

3 0
3 years ago
A type of sensor used to detect which way around a device is being held. ​
Marta_Voda [28]
There’s 3 main ones accelerometer, gyroscope, and magnetometer.
8 0
3 years ago
You are the network administrator for a company. The company's policy is that the users are allowed to set their own passwords b
insens350 [35]

After I have changed her password, all I will need to do is select the “User must change password at next logon” option. This option will prompt her to log on to her PC using the password I assigned to her.

Explanation

An active Directory on most Domain Controllers gives you access to add users, disable accounts, change password, and various other tasks. Assuming that everything is setup, I am just going to go to my Windows Server Manager dashboard of my Domain Controller. While I am at my dashboard, I will click on tools and then drop down to the Active Directory Users and Computers to locate my desired user who seems to have been locked out.

Once the user has been identified, I will simply need to right click on the account and select “reset password”. A small dialog box with a list of cool security options will pop up. I will be required to reset it to something simple and default and make sure to select the “User must change password at next logon” option.

What this means is that the user who is locked out, upon logging back in, will be prompted to enter the password I gave them first as default but then will immediately be asked to change the password to something new. We do not see options A and B a lot in the real world. It is best practice not to select these options

Learn more about Active Directory

brainly.com/question/13615178

brainly.com/question/13591643

#LearnWithBrainly

5 0
4 years ago
Other questions:
  • What type of attack intercepts communication between parties to steal or manipulate the data?
    13·1 answer
  • Please answer quick:))))
    7·1 answer
  • Consider a method defined with the header:
    13·1 answer
  • Portraits should not ever include any objects other than the person. <br>True <br>False
    11·1 answer
  • For what purpose is keylogging software used? a. To automatically translate input to another language as the user enters data b.
    10·1 answer
  • ______ is/are the replacement of human operation and control of machinery with some form of programmed control.
    11·1 answer
  • It is considered good practice to save a presentation before printing it. true false
    13·1 answer
  • Does any of yall know how to delete your account?
    10·1 answer
  • James root lol ........................
    12·1 answer
  • In addition to developing sketches, computer-aided design programs are used by fashion designers to perform which task?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!