1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Evgen [1.6K]
3 years ago
11

Which statement is true about parity in RAM?

Computers and Technology
1 answer:
mihalych1998 [28]3 years ago
8 0

Answer:

There needs to be an odd number of 1 bits

Explanation:

In memory, parity checking method is used to test the memory. There are two parity conditions. Either the parity is even or the parity is odd.

Odd parity means, number of 1's in eight bits of data. If the number 1's are odd  it means parity is odd. In case of the memory testing result the parity should be odd.

So, In case of Parity of RAM, the parity should be odd, if the data is stored in the RAM.

You might be interested in
A common use-case for dictionaries is to store word counts. Let's modify our program below to store the count for each unique wo
baherus [9]

Answer:

word_count={}

for i in text.split:

        if i in word_count:

                word_count[i]+=1

         else:

                 word_count[i]=1

print word_count

8 0
3 years ago
Case Project 2-1: The Differences Between IPv4 and IPv6 You are a network engineer for an IT consulting firm named F1IT. One of
Nadusha1986 [10]

Answer:

Following are the difference to this question:

Explanation:

IPv4:

The IPv_4 is uses the packet changed method, that is a Link Layer networks(like Ethernet).  It has 4.3 billion addresses capacity. It uses the 32-bit logical device address, that written in decimal language. It is divided by 4 bytes E.g. 192.168.1.1  

The host part and network part are 2 parts. For a network, the host part may vary, while for the entire subnet, the network part remains equal. The scheme of 232 addresses is available on application depends on security.

IPv6:

The IPv6 is used in the internet protocoland it is higher than IPv4. It can provide endless number Opf addresses, and use to solves the problem of IPv4 exhaustion and satisfies  the demand for rising networking.

IPv4 Substitutor Built to meet more IP address requirements. In the Logical address of 128-bit Written hexadecimally and with colons divided, and the Space of 128 addresses are required. IPsec is an integrated security feature.

5 0
3 years ago
____ are types of changes that occur when text has been omitted from a document and must be inserted later.
VMariaS [17]
You already wrote the answer. It is Additions
7 0
3 years ago
Data owners ensure that only the access that is needed to perform day-to-day operations is granted and that duties are separated
Akimi4 [234]

Answer:

True

Explanation:

As employees might be accessing business/client data, security of data access is a topmost priority.

8 0
3 years ago
PLZZ HELP!!!
Serga [27]

Answer:

I don't know

Explanation:

with data you can access all things in the world

8 0
3 years ago
Other questions:
  • Select the correct answer.
    14·1 answer
  • Cloud computing service providers manage different computing resources based on the services they offer. Which resources do IaaS
    11·1 answer
  • A Game Object must have a Transform<br><br> True<br><br> False
    5·1 answer
  • _____ is when a person connects their location to photos that are posted online.
    5·2 answers
  • Get two positive integers from the user. Write code to multiply the two numbers together using only addition or subtraction. You
    12·1 answer
  • A new drug to combat acne has been developed from a compound that is found in a melon. Which scientists would contribute to the
    15·2 answers
  • Which of the following is one of the tools in REPL.it that helps prevent syntax errors?
    10·1 answer
  • Which is the least technically experienced technical support group?
    7·1 answer
  • I need help about computer program. Solve C language code...... please​
    7·1 answer
  • A manager suspects that one of his team members has been fraudulently accessing confidential and sensitive information and breac
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!