1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
riadik2000 [5.3K]
3 years ago
13

____________________ memory is the ability to add RAM without shutting down the computer or operating system.

Computers and Technology
1 answer:
Liula [17]3 years ago
4 0

Answer:

Hot-add

Explanation:

The computer system is a electronic device that is used to perform computational task on input data for a pre-dertermined result. The components of the computer is divided into hardware and software components.

The hardware components are the physical parts of the computer system, while the software component are the instructions that runs the system.

The RAM is a physical component that provides memory for running current activities on the monitor screen. When it is removed or faulty, the screen goes blank. To add more RAM memory to the system while the system is on, activate the hot-add memory settings.

You might be interested in
Assuming that t is an array and tPtr is a pointer to that array, which expression refers to the address of element 3 of the arra
stealth61 [152]
<span>According to the basics of C++ syntax, &t[ 3 ] refers to the address of element 3 of the array given above. The array can be imagined like a box with some stuff. This stuff is the numbers which should be in "[ ... ]" with name of the array written before and "&".</span>
7 0
3 years ago
In computer science, what is the name for a series of steps used to solve a problem?
liraira [26]

Answer:

Algorithm

Explanation:

It is the step by step procedure,which defines a set of instructions which is to be carried out by the computer

5 0
3 years ago
In a blockchain, each block has a unique hash value which is dependent on the hash value of the previous block in the chain. Wha
pantera1 [17]

Answer: hello your question lacks the required option, below are the missing options

A. The transaction data in the tampered block is deleted, and a copy is created with the same hash value.

B. The hash values of transaction data of subsequent blocks are validated, and the chain is broken.

C. The hash value for the entire block is nullified, creating a domino effect on all subsequent blocks.

D. The hash values of subsequent blocks are updated as soon as they are tampered with, and the chain continues.

answer : The hash values of subsequent blocks are updated as soon as they are tampered with, and the chain continues ( D )

Explanation:

What happens if a transaction data is changed in an earlier existing block in a Blockchain is that the Hash values of subsequent blocks will be updated as soon as they are tampered with and the chain will continue.

Blockchain is a specially design system for recording information, hence any change in data inputted in an earlier existing blocks that changes will automatically be updated as well in all preceding blocks.

4 0
3 years ago
The definition of HTTP makes use of the ASCII character set without reference to how these characters are encoded. Explain why t
solniwko [45]
Abstraction comes from two latin words; abs which means away and trahere which mean to draw. From the meaning itself, it is to draw away something from specific objects, individuals, group, etc. In the computer world, a programmer hides all relevant data pertaining to the relevance of a data. It is done to increase efficiency and and reduce complexity. 
4 0
3 years ago
Read 2 more answers
What practices will help you avoid sending out e-mail to the wrong person?
wel
Check who you are sending it to before you hit send 
5 0
3 years ago
Other questions:
  • Select the correct answer.
    13·1 answer
  • Which of these browsers was the first widely adopted?
    12·1 answer
  • What is a series of instructions or commands that a computer follows used to create software
    9·1 answer
  • WILL GIVE BRAINLIEST TO FIRST AND BEST ANSWER!
    10·1 answer
  • A popular encryption method used to protect data that travel over a wireless network is ____
    12·1 answer
  • Your it department enforces the use of 128-bit encryption on all company transmissions. your department also protects the compan
    13·1 answer
  • What is project management? A. Brainstorming ways to plan a project B. Executing, completing, and revising a project C. Managing
    10·1 answer
  • Ivan wants to have code in a game that will make it possible to change the speed of a swimmer in the game. Which of these does I
    8·1 answer
  • Write an application named Hurricane that outputs a hurricane’s category based on the user’s input of the wind speed. Category 5
    7·1 answer
  • (40 PTS) Be specific
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!