1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
riadik2000 [5.3K]
2 years ago
13

____________________ memory is the ability to add RAM without shutting down the computer or operating system.

Computers and Technology
1 answer:
Liula [17]2 years ago
4 0

Answer:

Hot-add

Explanation:

The computer system is a electronic device that is used to perform computational task on input data for a pre-dertermined result. The components of the computer is divided into hardware and software components.

The hardware components are the physical parts of the computer system, while the software component are the instructions that runs the system.

The RAM is a physical component that provides memory for running current activities on the monitor screen. When it is removed or faulty, the screen goes blank. To add more RAM memory to the system while the system is on, activate the hot-add memory settings.

You might be interested in
How does cryptocurrency exchange software works?
vovangra [49]

Answer:

They allow exchanging one cryptocurrency for another, the buying and selling of coins, and the exchange of fiat money into crypto. Crypto exchanges set the rate of the currencies — both coins and tokens. ... Basically, crypto exchanges work similarly to regular stock exchanges

Explanation:

8 0
3 years ago
What is the term for sending emails that imitate legitimate companies?
Nookie1986 [14]

Answer:

phishing,,,, it imitates the company email so that when you get on the mail it can collect all your data and then can begin to hack using your information such as password

Phishing refers to the malicious attack method by attackers who imitate legitimate companies in sending emails in order to entice people to share their passwords, credit card or other sensitive personal information. ... If you do surrender such information, the attacker will immediately capture your personal information.

4 0
3 years ago
Read 2 more answers
The term information technology was first used what year?
skelet666 [1.2K]

Answer:

1958

Explanation:

The term was first published in the 1958 Harvard Business Review when authors Harold J. Leavitt and Thomas C. Whisler said “the new technology does not yet have a single established name. We shall call it Information Technology.”

7 0
2 years ago
Read 2 more answers
Por favor alguem poderia me falar qual PC e melhor: Computador Gamer Fox PC FPS Intel Core i5 8GB (GeForce GTX 1050Ti 4GB GDDR5)
Ivanshal [37]

Eu acredito no primeiro como ele tem uma GTX 1050ti, i5 e 2tb.

3 0
3 years ago
Force field meaning in science fiction
expeople1 [14]
In science fiction, a force field is a defensive barrier made up of energy. They are used to protect, people, an area, animals, etc from an attack or a destructive impact.
5 0
2 years ago
Other questions:
  • What lie does E.D. tell to keep the musical from being canceled? There is a television crew coming to do a story on it. Jake wil
    6·1 answer
  • What is the difference between C and C++. If I know C, will it be hard to lean C++?
    15·1 answer
  • Given two variables , first_place_winner and second_place_winner, write some code that swaps their associated values. use any ad
    12·1 answer
  • In the Advent of computer technologies and it's applications, to what extent these technologies have influenced the world.
    11·1 answer
  • The study of a current business and information system application and the definition of user requirements and priorities for a
    5·1 answer
  • How to chnage email adresss on slate from tophat?
    13·1 answer
  • (1)similarities between backspace key and delete key. (2) different between backspace key and delete key. (3) explain the term e
    10·1 answer
  • In a swap you need a variable so that one of the values is not lost ? Need help
    7·2 answers
  • _______________ is a computer networking protocol used by hosts to retrieve IP address assignments.
    11·1 answer
  • 1- pensamiento sistémico<br>2- visión oriental y occidental​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!