1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Radda [10]
4 years ago
8

6. Which of the following options is used to view a computer's memory properties?

Computers and Technology
1 answer:
pentagon [3]4 years ago
3 0
There is an option used to vew a computer's memory properties by just simply opening your My computer directory. There you can see different names of your hard drive, there you choose what hard drive you want to view by just right clicking it and choosing properties. There you will see it's memory space.
You might be interested in
I want to make apps but I don't know how and which things I have to learn first ,so if you know mention from starting to ending​
anyanavicka [17]

Answer:

There are a lot to learn, especially the basics. I'd suggest using SolorLearn for this.

6 0
3 years ago
Hiiiiiiiiihwdawdfgthnythgrfergthyjuhgfd
Lilit [14]

Answer:

Your answer would be gas.

Explanation:

Steam is just water just evaporated.

3 0
3 years ago
Read 2 more answers
Suppose two hosts, A and B, are connected by a 10 Mbps link. The length of a packet is 12 Kb (Kilobits, i.e., 12 × 103 bits). Th
Alekssandra [29.7K]

Answer:

Answer is provided in the explanation section

Explanation:

Given data:

Bandwidth of link = 10* 106 bps

Length of packet = 12* 103 bits

Distance of link = 40 * 103m

Transmission Speed = 3 * 108 meters per second  

Formulas:

Transmission Delay = data size / bandwidth = (L /B) second

Propagation Delay = distance/transmission speed = d/s

Solution:

Transmission Delay = (12* 103 bits) / (10* 106 bps) = 0.0012 s = 1.2 millisecond

Propagation Delay = (40 * 103 meters)/ (3 * 108mps) = 0.000133 = 0.13 millisecond

4 0
4 years ago
Represent the measuring unit ofcomputer un terms of fration of second​
motikmotik

Duplicate Question: https://brainly.in/question/21737632

7 0
3 years ago
Create a Python script that takes two parameters to do the following:-
tekilochka [14]

Answer:

import sys, time

from os import walk, remove

from os.path import exists, join, getsize, getctime

file_counter = [ ]

folder_name, file_size = argv

isExist = exists( folder_name )

if folder_name == True:

    for root, folder, files in walk( folder_name ):

          for file in files:

               if getsize( join ( root, file ) ) >= file_size:

                   file_log = [ ]

                   file_log.append( file )

                   file_log.append( join ( root, file) )

                   file_log.append( time.ctime( getctime( file ) ) )

                   file_counter.append( file_log )

               else:

                   remove ( join ( root, file ) )

Explanation:

The python script above output the filename, size and file creation date of any folder passed to it.

6 0
3 years ago
Other questions:
  • A custom date format set for a date/time field that contains the symbols mmm/dd/yy would display the date as ____.
    12·1 answer
  • Rearrange the statements in the following order so that the program prompts the user to input: a. The height of the base of a cy
    12·1 answer
  • Where may an operating system reside in a mobile device?
    5·1 answer
  • Identify ways you can manage a project using project management software
    14·1 answer
  • An unauthorized user is a network _______ issue.
    11·1 answer
  • 4. How could you apply some of the ideas, principles, or structures of coding to fields of study, industries, or tasks outside o
    8·1 answer
  • What animal does maleficent transform into in order to defeat prince phillip?
    13·2 answers
  • Advancing technology has made life easier for people and businesses today. Imagine that you have to work for an entire day witho
    11·1 answer
  • How do cybercriminals use JavaScript maliciously?
    11·1 answer
  • What type of attack occurs when the threat actor snoops and intercepts the digital data transmitted by the computer and resends
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!