1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IRISSAK [1]
3 years ago
9

Will mark Brainliest!! What is the best memory to use on a computer? Why?

Computers and Technology
1 answer:
goblinko [34]3 years ago
4 0

Answer:

Corsair Vengeance RGB Pro 32GB (2x16GB) DDR4 3200 (PC4-25600) C16 Desktop Memory - Black. ...

Corsair Vengeance LPX 16GB (2 X 8GB) DDR4 3600 (PC4-28800) C18 1.35V Desktop Memory… ...

Corsair Vengeance LPX 32GB (2x16GB) 3200MHz C16 DDR4 DRAM Memory Kit

Explanation:he amount and specs of your system’s memory, or RAM, can make a significant difference, from the number of running programs (or just open browser tabs) that you can have open before your system starts getting sluggish, to the frames per second (fps) you can squeeze out of your CPU’s integrated graphics when playing the latest popular esports title.

If you’re shopping for some memory for a new build, or an upgrade to your existing laptop or desktop, and you’re confused whether you need 8, 16, or 32GB (or more), how much clock speed matters, or what memory timings actually mean, you’ve come to the right place. We’ll help you work through the many things to consider when shopping for RAM.

You might be interested in
Summary: Given integer values for red, green, and blue, subtract the gray from each value. Computers represent color by combinin
Dmitry_Shevchenko [17]

Answer:

Follows are the code to this question:

#include<iostream>//defining header file

using namespace std;// use package

int main()//main method

{

int red,green,blue,x;//declaring integer variable

cin>> red >>green>>blue;//use input method to input value

if(red<green && red<blue)//defining if block that check red value is greater then green and blue  

{

x = red;//use x variable to store red value

}

else if(green<blue)//defining else if block that check green value greater then blue  

{

x= green; //use x variable to store green value

}

else//defining else block

{

x=blue;//use x variable to store blue value

}

red -= x;//subtract input integer value from x  

green -=x; //subtract input integer value from x

blue -= x;//subtract input integer value from x

cout<<red<<" "<<green<<" "<<blue;//print value

return 0;

}

Output:

130 50 130

80 0 80

Explanation:

In the given code, inside the main method, four integers "red, green, blue, and x" are defined, in which "red, green, and blue" is used for input the value from the user end. In the next step, a conditional statement is used, in the if block, it checks red variable value is greater than then "green and blue" variable. If the condition is true, it will store red variable value in "x", otherwise, it will goto else if block.

  • In this block, it checks the green variable value greater than the blue variable value. if the condition is true it will store the green variable value in x variable.
  • In the next step, else block is defined, that store blue variable value in x variable, at the last step input variable, is used that subtracts the value from x and print its value.      
5 0
4 years ago
Choose the type of attack that is based on entering fake information into a target network domain name server?
SSSSS [86.1K]

Answer:

DNS poisoning

Explanation:

DNS is a server service that verifies or resolves an IP address to a site or domain name. It's services is made available with a dhcp request from a client system, providing the ip address of the DNS server. The DNS server has the records of domain name linked to their individual ip addresses.

When an attacker wants a client to visit his site without knowing the site is not genuine, he gains access to the dns server and changes the information or poisons the entries of the server. So if the client tries to access that site, it takes him to the attackers site. This is called DNS poisoning.

4 0
3 years ago
Who invented the Porsche?
horsena [70]

Ferdinand Porsche. Hoped this helped!

3 0
3 years ago
Read 2 more answers
Johnny just set up a TCP connection with a web server in Chicago, Illinois, claiming he is coming in with a source IP address th
wariber [46]

Answer:

Assuming that the distance from Chicago Illinois to Copenhagen Denmark is 4200 miles and the speed of light is 186,400 miles per second;

The time difference 10 milliseconds in the session log and the calculated time of 22.5 milliseconds.

Explanation:

The TCP three way handshake connection time is determined by the distance between the connecting hosts and the speed of the link.

If the distance between the hosts is 4200 miles and the link speed is an assumed speed of light 186,400 miles per second, the TCP session time is;

Time = distance/ speed

Time = 4200 / 186400

Time = 0.0225 seconds. = 22.5 milliseconds

But Johnny's TCP session time is 10 milliseconds, therefore Johnny is lying about the source IP address from Copenhagen Denmark.

7 0
3 years ago
What landforms are likely to form at this boundary
Paha777 [63]
<span>Landforms that could be created at convergent boundaries would consist of: volcanoes, mountains, trenches, volcanic islands, and even deserts could result from effects of converging boundaries. The landforms are mountains.</span>
3 0
3 years ago
Other questions:
  • The PictureBook class is a subclass of the Book class that has one additional attribute: a String variable named illustrator tha
    9·1 answer
  • A network on the internet has a subnet mask of 255.255.240.0. what is the maximum number of hosts it can handle
    5·1 answer
  • To distribute one or more presentations for use on another computer, which of the following features should you use?
    13·1 answer
  • One modeling technique drawn from systems analysis and design that can provide an excellent way to illustrate how a business fun
    13·1 answer
  • Using the simple alphabet code below, you will decode and encode the message. Write the Full
    6·1 answer
  • Betty was sitting at a coffee shop reading her favorite book. She heard an explosion nearby. In a few, she could hear ambulance
    7·2 answers
  • What website or search engine that helps people find the web pages that they are looking for by tying in the subject they want?​
    5·1 answer
  • Please help me on this it’s due now
    5·1 answer
  • Please help! Python programming, use the factorial operation to evaluate 4!. Answers are in picture please pick one, thank you.
    15·1 answer
  • Which of the following file formats allows you to share and save documents
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!