Answer:
You are allowed to take out the old ram to replaice it, so replaice it with 2 new 4 GB of ram you dont need to unless the laptop has already 4 GB of ram the type of ram you will use is DDR3 most newer pc's have DDR4 since laptopes are smaller you would need older ram
Explanation:
Answer:
See explaination
Explanation:
#include <stdio.h>
#include <stdlib.h>
int main()
{
FILE * file_object;
char file_name[100];
char ch;
int characters=0, words=0;
printf("Enter source file name: ");
scanf("%s", file_name); //asking user to enter the file name
file_object = fopen(file_name, "r"); //open file in read mode
if (file_object == NULL)
{
printf("\nUnable to open file.file not exist\n"); //check if the file is present or not
}
while ((ch = fgetc(file_object)) != EOF) //read each character till the end of the file
{
if (ch == ' ' || ch == '\t' || ch == '\n' || ch == '\0') //if character is space or tab or new line or null character increment word count
words++;
else
characters++; //else increment character count this assures that there is no spaces count
}
printf("The file story.txt has the following Statistics:\n"); //finally print the final statistics
if (characters > 0)
{
printf("Words: %d\n", words+1); //for last word purpose just increment the count of words
printf("Characters (no spaces): %d\n", characters);
}
fclose(file_object); //close the file object
return 0;
}
As specified in RFC5735, this is an address from the "link local" block. It is assigned to a network interface as a temporary address, for instance if no static address is configured and the DHCP server is not found.
If you boot your PC without a network cable, you'll probably end up with a 169.254.*.* address.
A Design Basis Threat (DBT) is known to be a characteristics of any given or potential insider and also those of external adversaries, that may try to have or gain unauthorized removal or sabotage, against a physical protection system that was set up designed and evaluated.
<h3>What are Cybersecurity objectives?</h3>
Cybersecurity aims are:
- To protect computer system,
- To protect networks,
- To protect software programs from such cyber attacks.
Note that a lot of digital attacks are targeted at accessing, changing, or deleting sensitive information as well as others.
Learn more about IT from
brainly.com/question/1276995
#SPJ1