1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IRISSAK [1]
3 years ago
9

Will mark Brainliest!! What is the best memory to use on a computer? Why?

Computers and Technology
1 answer:
goblinko [34]3 years ago
4 0

Answer:

Corsair Vengeance RGB Pro 32GB (2x16GB) DDR4 3200 (PC4-25600) C16 Desktop Memory - Black. ...

Corsair Vengeance LPX 16GB (2 X 8GB) DDR4 3600 (PC4-28800) C18 1.35V Desktop Memory… ...

Corsair Vengeance LPX 32GB (2x16GB) 3200MHz C16 DDR4 DRAM Memory Kit

Explanation:he amount and specs of your system’s memory, or RAM, can make a significant difference, from the number of running programs (or just open browser tabs) that you can have open before your system starts getting sluggish, to the frames per second (fps) you can squeeze out of your CPU’s integrated graphics when playing the latest popular esports title.

If you’re shopping for some memory for a new build, or an upgrade to your existing laptop or desktop, and you’re confused whether you need 8, 16, or 32GB (or more), how much clock speed matters, or what memory timings actually mean, you’ve come to the right place. We’ll help you work through the many things to consider when shopping for RAM.

You might be interested in
What are the two types of computer keyboards and how are they different?
VARVARA [1.3K]
A piano keyboard
A qwerty keyboard
A Dvorak Simplified Keyboard

These are 3 types of keyboard
4 0
3 years ago
Read 2 more answers
Question 1 Which portion of the PuTTY package allows you to perform file transfers using the SCP (Secure Copy) protocol?
Artyom0805 [142]

There are different aspect of computing. The portion of the PuTTY package that allows you to perform file transfers using the SCP (Secure Copy) protocol is pscp.exe.

The pscp.exe tool commonly called the PuTTY Secure Copy Client is known to be the only portion of the Putty package that can let you copy files to and from remote computers through the use of the SCP.

Secure Copy (SCP)  is simply defined as a computer command that one can use in Linux to copy files from one computer to another on a network.  PuTTY is simply known to be a free implementation of SSH (and telnet) used for computer that running Microsoft Windows.

Learn more about the PuTTY package from

brainly.com/question/13171394

8 0
3 years ago
If you delete a file from removable media, it is stored in the recycle bin where you can recover it until you empty the recycle
Natasha2012 [34]

The appropriate response is no. why you can't discover it. After we erased our information, the information will be put away recycle bin, on the off chance that you purge the reuse receptacle, the information will be erased, and in the meantime, Windows will list the space as accessible room. On the off chance that you cover the recycle bin with other data's, the information put away before will really lost, so in the event that you need to recuperate the information in our recycle bin, don't attempt to cover it with something else.

<span>On the off chance that you may need to recuperation it, For standard individuals, we can't recuperation it straightforwardly, on the off chance that you have enough cash, you can send it to a few information recuperation organization to acknowledge proficient recuperation, however to the extent I am concerned, few of us can pay for it in view of a few information, you may feel frantic, yet another way, is attempt to utilize a few information recuperation programming.</span>

5 0
3 years ago
Match the context details with the pattern that applies.
tia_tia [17]

Answer:

1. - Observer

2. - iterator

3. - strategy

4. - composite

5. - decorator

Explanation:

An object contains other objects (elements) and must give access to them for clients, without exposing its internal structure. This is an observation.

The subject-object can generate events as an iterable (iterator) and could use different strategic algorithms to achieve a task. Class objects can be used to aggregate other class objects.

In python, the decorator function mimics the outer function of a nested function, but still maintains the functionality of the second function

6 0
3 years ago
Alexis received paychecks from both her jobs and she would like to deposit them. One check is for $62.88 and the other is $523.2
Karolina [17]

Answer:

something :}

Explanation:

have a good day

8 0
3 years ago
Other questions:
  • Consider the following method.
    13·1 answer
  • Does anyone have game design in connections
    13·1 answer
  • Can you please answer these questions for me: Is it illegal to copyright? What does it mean to get copyrighted? What are example
    12·2 answers
  • Two powerboats are about to cross paths. what should the boat on the starboard (right) do?
    11·1 answer
  • A server would experience a __________ attack when a hacker compromises it to acquire information from it from a remote location
    13·1 answer
  • How can software be used to protect against hardware failures in systems that embody both? Give two examples of how software can
    14·1 answer
  • Computer keyboard failures can be attributed to electrical defects or mechanical defects. A repair facility currently has 25 fai
    14·1 answer
  • True or false.local and cloud backup differs in where the backup is saved
    15·2 answers
  • What is the difference between "What I ought to do?" and "What kind of person should I be"?
    12·1 answer
  • A computer is assigned an IP address of 169.254.33.16. What can be said about the computer, based on the assigned address?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!