a laptop has 1gb of installed memory and uses shared video memory. if the video card is using 256mb, how much is left for the rest of the system?

Answers

Answer 1

Using shared video memory, a laptop has 1 GB of installed memory. If the video card is only consuming 256MB, the remaining 768MB can be used by the system.

The ability of the mind to encode, store, and retrieve information when required is known as memory. It is the process of holding onto knowledge over time in order to influence behavior in the future. Language, relationships, and the development of personal identity would all be impossible if the past was not remembered. Forgetfulness or amnesia are common terms used to describe memory loss.

A sensory processor, short-term (or working) memory and long-term memory make up the information processing system that is commonly referred to as memory. The neuron may be relevant in this. The sensory processor enables external information to be sensed as chemical and physical stimuli and attended to at different levels of focus.

Learn more about memory here:

https://brainly.com/question/28698996

#SPJ4


Related Questions

write the turtle graphics statements to draw a square that is 100 pixels wide on each side and filled with the color blue.

Answers

It draws the blue square at coordinated(100,0) 50 pixel wide, and in the lower-left corner. You should know that the lower-left corner of the square should be at position x, y. Hence, The answer.

And this is true for any shape that you draw using turtle graphics in Python.

You should also know the function format of Python, and how it is defined, declared  and called. The penup command tells the turtle to not show what is drawn, or hide the link. The pen down is just opposite to this.

The count is an above with range to create a for the look .Forward moves the cursor according to width mentioned.

See how to pen down is called before beginning fill. And how we move to x, y using go to, and how the penup is used to hide ink while  fill color is in effect, and we move to x, y.

To learn more about Turtle Graphics, Click here

brainly.com/question/20718793

#SPJ4

if the sdn controller wants to split the ttraffc from a switch/router evenly into multiple outgoing links.what information will be for the controller determine the rules

Answers

SDN controller manages flow control to the switches/routers “below” (via southbound APIs) and applications and business logic “above” (via northbound APIs) to provide an intelligent network.

What protocol does the SDN controller use to control the SDN controlled switch?

Open Flow is the default southbound protocol used between SDN controllers and switches. The SDN controller takes information from the application and converts it into flow entries that are fed to the switch via the OF. It can also be used in network management to monitor switch and port statistics.

What interface is used for communication between SDN controllers?

It is an open interface that configures the forwarding tables of network switches and routers according to the desired route of network packets derived and determined by the SDN controller.

How do SDN controllers communicate with each other?

These use announcement and messaging systems or distributed routing protocols such as BGP or OSPF. Sixth, the southbound interface allows interaction between the control plane and the data plane. Collectively, this can be defined as a protocol that allows controllers to push policies to the forwarding plane.

To learn more about SDN controller visit:

https://brainly.com/question/11058708

#SPJ4

because small embedded systems typically run only one program, constants are always stored in ram so they can be easily changed. question 13 options: true false

Answers

True, constants are always saved in RAM so they can be altered easily because small embedded systems normally execute just one software. Computers make up embedded systems.

Is a grouping of a computer's CPU, memory, and input/output peripherals that performs a specific task as part of a larger mechanical or electronic system. It is integrated as a component of a finished product that frequently also includes mechanical and electrical components. The hardware and software that make up a computer system are used to carry out particular tasks. The term "system" refers to the coordination of separate elements that carry out a single activity or a group of related tasks are called as embedded systems.

Learn more about embedded systems here

https://brainly.com/question/9706390

#SPJ4

question 7 imagine a designer finishes a client project and wants to write a case study. they draft a case study that describes their role in the project, the goal of the project, and the target user. they also add sketches and wireframes, and their polished designs. what critical components are missing from the case study? select all that apply.

Answers

Instead of focusing solely on the appearance of the design project's final result, the case study aims to contextualize it and demonstrate how it functions in a real-world setting.

Should your design portfolio simply contain case studies from your professional UX design work?

Three to four pertinent UX case studies should be included in your UX design portfolio in order to fully showcase your skills. Recruiters may accept UX design portfolios that include 1-2 UX case studies if you are new to the field.

Which platform should you prioritize when creating a new product when building a cross-platform experience?

The platform you choose should satisfy the requirements of your end users. Having a distinct brand identity is crucial.

To know more about case study visit :-

https://brainly.com/question/24259426

#SPJ4

which word can be used to identify the following words: double, float, else, string, void, true, false, public a. classes b. namespaces c. keywords d. methods

Answers

The dos and don'ts of writing C++ code are thoroughly explained in this article in order to manage this complexity.

One of the most popular development languages employed by numerous open-source projects is C++. Every C++ programmer is aware of the language's numerous powerful capabilities, but this power also adds complexity, which can make code more prone to bugs and more challenging to comprehend and maintain. These guidelines are in place to maintain code manageability while also enabling programmers to effectively use C++ language capabilities. The rules that guide our C++ code are referred to as style, sometimes known as readability. Since these conventions embrace much more than just source file layout, the name "Style" is somewhat misleading.

Learn more about code here-

https://brainly.com/question/17293834

#SPJ4

what is the maximum number of elements in a sorted array of 122 elements that will be examined using a binary search before it is discovered that the element is not in the array?

Answers

The above question is written in java programming.

int endOfArray = 122;

try {

  while (true) {

    int value = theArray[endOfArray*2];

    if (value > requestedValue)  // good enough

       return doBinarySearch(theArray, 0, endOfArray, requestedValue);

    else

      endOfArray*=2;

  }

}

catch (ArrayIndexOutOfBoundsException aioob) {

 // we know that the end of the array is less than endOfArray*2 but > endOfArray

 // do something clever here TBD.   :-)

}

The Java Programming Language is an object-oriented, concurrent, deeply typed, general-purpose language. The Java Virtual Machine Specification defines the bytecode instruction set and binary format to which it is typically compiled. Object-oriented programming (OOP) is a structure used in Java. A class-based programming language is Java.

The JVM performs the three basic primary tasks:

The class loader is responsible for loading code.

Byte code verification is used to validate the code.

runs code: carried out by the runtime interface

Learn more about  java programming here:

https://brainly.com/question/2266606

#SPJ4

if stuff is a list of integers (with at least one element), what value is in the variable x after the code executes? x

Answers

If stuff is a list of integers (with at least one member), when the code is executed, the largest number in the list will be stored in the variable x.

A variable is a named container for a certain set of bits or types of data in computer programming. It is an abstract storage place with an associated symbolic name that holds some known or unknown quantity of information called a value (like integer, float, string, etc...). A memory address may eventually be used to link or identify a variable. The standard method of referencing a stored value, in addition to, or instead of, the variable itself, depends on the context. Due to the distinction between name and content, a name can be used regardless of the precise data it refers to. A value may be bound to an identifier in computer source code.

Learn more about variable here:

https://brainly.com/question/13375207

#SPJ4

alyssa wants to use her android phone to store and manage cryptographic certificates. what type of solution could she choose to do this using secure hardware?

Answers

She might use a safe hardware solution like a MicroSD HSM (hardware security module) to accomplish this.

Any physical part of an analog or digital computer is referred to as "computer hardware" collectively. The term "hardware" separates the physical components of a computing system from "software," which consists of written, machine-readable instructions or programs that instruct physical components on what to do and when to execute them.

Both hardware and software work well together. Only when hardware and software are properly integrated can a computing device operate effectively and generate valuable output.

Internal or external components make up different types of computer hardware. External hardware components are typically attached to a computer to add or enhance functionality, whilst internal hardware components are those required for the device to operate properly.

Learn more about hardware here:

https://brainly.com/question/5892106

#SPJ4

which protocol can send cryptographic confirmation that an endpoint is who it claims to be so that arp poisoning is hindered?

Answers

The Secure Neighbor Discovery (SEND)  protocol can send cryptographic confirmation that an endpoint is who it claims to be so that ARP poisoning is hindered.

ARP poisoning is the practice of tricking hosts into delivering the attacker's traffic to someone else in order to gain access to the broadcast section. This is prevented by the SEND Protocol.

Any neighbor, presumably even in the presence of authentication, is able to send Router Advertisement messages and thereby able to cause a denial of service.

The protocol contains no mechanism to determine which neighbors are authorized to send a particular type of message (for example, Router Advertisements). Additionally, any neighbor has the ability to launch a potential denial-of-service assault by sending proxy Neighbor Advertisements and unsolicited Neighbor Advertisements.

Support for SEND is currently regarded as optional. SEND deployment is probably only going to be taken under consideration in situations where nodes are operating in exceptionally rigorous security environments because of how difficult it is to deploy it and how heavyweight its provisioning is.

To learn more about ARP poisoning click here:

brainly.com/question/28381584

#SPJ4

users at universal containers (uc) adhere to the following process for expense reports: create the expense report. attach receipts in an expenses app. send the report to the accountant to review and approve. an administrator needs to enable this app for salesforce mobile. what should the administrator consider from the user's perspective?

Answers

From the user's perspective, the administrator takes into account. User records can be created, submitted for approval, and receipts can be attached as images.

What in Salesforce is a universal container?

The rapidly expanding global producer of container solutions, Universal Containers, comes up with various scenarios by getting users to consider things from a business perspective and also by giving instructions on what sectors and scenarios we will encounter and how to deal with them.

Which MDM data piece is required for reporting between these systems?

US recently put into place a master data management (MDM) solution that will serve as the system of record for consumer information.

To know more about universal containers visit :-

https://brainly.com/question/15056535

#SPJ4

the standards for sql has been maintained by the american national standards institute (ansi). select one: true false

Answers

The correct answer is True the standards for sql has been maintained by the american national standards institute (ansi).

The existing records in a table can be deleted using the SQL DELETE Query. All of a table's rows are removed using the truncate command. A where clause cannot be used in this. A DDL command, that is. Each record that has to be deleted from a table is locked using the SQL Delete statement. Data kind. Fixed-length character data types are the second best option for a primary key after integer (number) data types. Because character data type values must first be converted to ASCII values before processing, SQL Server processes number data type values more quickly than character data type values. String(n) is not supported by the SQL standard, although char, varchar, and float are.

To learn more about sql click the link below:

brainly.com/question/13068613

#SPJ4

data independence is a term that refers to data and program modules being so tightly interrelated that they become difficult to modify. true or false

Answers

Data independence is a term that refers to data and program modules being so tightly interrelated that they become difficult to modify is false.

Why is data independence and what does it mean?

According to the definition of data independence, a DBMS's ability to alter the database schema at one level of a database system without also needing to update it at a higher level is a key feature. You can maintain data independence by keeping it separate from any programs that use it.

Therefore, For any form of a centralized DBMS, data independence is the kind of data openness that is important. It alludes to the user applications' resistance to modifications made to the definition and arrangement of data. Ideally, application programs shouldn't be made aware of the specifics of data storage and representation.

Learn more about Data independence from

https://brainly.com/question/14699179
#SPJ1

Other Questions
Question 11Toby found a $52 wallet on the clearance rack for 60% off. If sales tax is 6.25%, how much will he pay in total?A. $ 22.10B. $ 23.75C. $ 28.50D. $ 33.15A No answer provideda. Ab. Bc. Cd. DQuestion 10Angela took 56 minutes to take her history test. Bryan took 70% of the time that it took Angela to complete the test. How long did it take Bryan to take his history test?A. 36.4 minutesB. 38.5 minutesC. 39.2 minutesD. 41.8 minutesA. No answer provideda. Ab. Bc. Cd. DQuestion 9What is 95% of 60 ? Though Monty and Elena just met, they really bonded over the fact they are both writers who work with public figures. Monty makes a living writing celebrity biography, and Elena writes speeches for politicians. What type of writing are both Montys and Elenas works examples of? A. prescriptive nonfiction B. mainstream journalismC. creative nonfiction D. ghostwriting ___is an organized movement of concerned citizens, businesses, and government agencies to protect and improve people's current and future living conditions. How does jekyll misuse and abuse his position as a scientist? In dr Jekyll and my Hyde. Please help me, write it in numbers please, not letters. It's due tonight and I need help with everything! A fair coin is flipped 10 times and the number of heads is counted. The procedure of 10 coin flips is repeated 100 times and the results are place in a frequency table. Which of the frequency tables below is most likely to contain the results from these 100 trials?chart shows number of heads 0-10 and then the following frequencies in order....0/0/6/9/22/24/18/12/7/2/0 (REMEMBER two zeros at top and just 1 zero at end) which of the following performance appraisal methods requires managers to keep logs that focus on individual-employee behavior in specific situations? amanda has a short-term labor shortage. she needs to hire some workers quickly and does not have time to screen them herself. her best external recruitment source would be . which of the following is acceptable in the name of a corporation to signify that the business is a corporation? select one: a. company, corporation, and inc. b. company c. corporation d. inc. Please help 100 points!! give two examples of functions from z to z that are one-to-one but not onto. 21. give two examples of functions from z to z that are onto but not one-to-one. who needs an advance (healthcare) directive? (please give the most comprehensive answer that is true.) ASAP!! Which one is not an irrational number? I believe its A but I just want to double check. What do Mike and his grandmother give each other? (What is passed from generation to generation?)Story The mustache Which of the following statements about factors that may affect eyewitness testimony are accurate and which are not? -Accurate Statement(s);-Inaccurate Statement(s) consider the market for medical doctors. suppose the opportunity cost of going to medical school increases for many individuals. further, suppose it generally takes about 10 years to become a practicing doctor. holding all else constant, in 10 years the equilibrium wage for doctors will which two numbers whose product is -10 and whose sum is 10 ? Production of which of the following types of proteins during an innate immune response would directly lead to the lysis of a microbe?- Membrane Attack Complex- Perforin- Immunoglobulin- Interferon Atmopheric air ha a temperature of 85 f and dew point of 53f what i relative humidity when cooled to 60f ? how many pound of water are removed from 20000 cu ft if cooled to 35F? Flanders Company has outstanding 18 million shares of $2 par value common stock and 2 million shares of $4 par value preferred stock. The preferred stock has an 8% dividend rate. The company declares $1,200,000 in total dividends for the year. Which of the following is correct if dividends in arrears are $60,000?A.) Preferred stockholders will receive $180,000; common stockholders will receive $1,020,000.B.) Preferred stockholders will receive $640,000; common stockholders will receive $560,000.C.) Preferred stockholders will receive $700,000; common stockholders will receive $500,000.D.) Preferred stockholders will receive $120,000; common stockholders will receive $1,080,000.