What is a possible explanation for the issue described below? A user reports that ever since she or he began creating animations, graphics, and video clips for the company’s Web site on her or his computer, the computer has begun running slower, especially when performing the graphics functions. The computer needs an increase in VRAM. The computer needs an increase in SRAM. The computer needs an increase in SIMM. The computer needs an increase in RIMM.

Answers

Answer 1
VRAM because VRAM is used for graphic intensive workloads
Answer 2

Answer:

The computer needs an increase in VRAM

It is A


Related Questions

what is robotic technology

Answers

Answer:

according to britannica :

"Robotics, design, construction, and use of machines (robots) to perform tasks done traditionally by human beings. ... Robots are widely used in such industries as automobile manufacture to perform simple repetitive tasks, and in industries where work must be performed in environments hazardous to humans"

Explanation:

It is used to select specific menu options, drag and drop options and to draw something on screen.

Answers

Answer:

A mouse.

Explanation:

An input device can be defined as any device that is typically used for sending data to a computer system.

Generally, all of the output and input device of a computer are known as peripheral (external) devices and they provide data (informations) to the end users in various formats such as video, audio, texts, images etc.

Since input devices are peripheral (external) devices, they can be connected to the computer system wirelessly or through a wired-connection (cable).

Some examples of peripheral (external) devices are monitor, speakers, keyboard, printer, scanner, projector, mouse, etc.

A mouse is an input device that is designed and used to select specific menu options, drag and drop options and to draw something on screen.

How to execute python code in command prompt *window*?

Iam using sublime text 3 and want to execute my python code in command prompt.
This is my current build system:

{
"cmd": ["python", "$file"],
"selector": "source.python",
"file_regex": "^\\s*File \"(...*?)\", line ([0-9]*)"
}

But I want my program to open in command prompt window and show the result there. I dont want to see the result in sublime text. Please help.

Answers

Answer:

Open Command Prompt and type “python” and hit enter. You will see a python version and now you can run your program there

Your disaster recovery plan calls for backup media to be stored at a different location. The location is a safe deposit box at the local bank. Because of this, the disaster recovery plan specifies that you choose a method that uses the least amount of backup media, but also allows you to quickly back up and restore files. Which backup strategy would BEST meet the disaster recovery plan

Answers

Answer:

Perform a full backup once per week and a differential backup the other days of the week.

describe in detail what each step would look like if you ran into a software error.

Answers

Answer:

First you have to identify the problem.

Second Gather information.

Third iterate through potential solutions.

Fourth Test your solution.

Explanation:

There are many different ways to handle errors in software but this is the way I do it.

Hope this helps :)

After running into a software error, a user needs to first determine the reason for the error, work towards a solution and then execute the solution discovered.

Software Error

A software error occurs when an error or unusual behaviour is observed in a piece of software and which can be reproduced after certain actions are performed that are in line with the stated rules of the software developer. In other words, a software error does not occur if the software was not used as directed by the software developer.

You can learn more about software errors here https://brainly.com/question/18497347

#SPJ6

A transition is ________.

Answers

Answer:

the process or a period of changing from one state or condition to another.

Explanation:

"students in transition from one programme to another"

You are the security analyst for your organization. Clients are complaining about being unable to connect to the wireless network. After looking into the issue, you have noticed short bursts of high-intensity RF signals are interfering with your wireless network's signal. Which type of attack are you most likely experiencing

Answers

Explanation:

denial of service attacks (dos)

Based on the above, the kind of attack the person is most likely experiencing is known as jamming.

What is Electronic jamming?

This is known to be a kind of  electronic warfare that is the use of jammers that shows interfering signals toward an enemy's system and thus it often blocks the receiver.

Therefore, Based on the above, the kind of attack the person is most likely experiencing is known as jamming.

Learn more about jamming from

https://brainly.com/question/17488276

#SPJ9

Which of these would you use to connect a mouse to a computer?
O RAM
O ROM
O USB
O TOT

Answers

USB is the answer because that is the adapter to plug it in

how do I answer question

Answers

Answer:

To answer a question on brainly, there is a add answer button below the question. Please look at the attached, it shows you the add answer button.

Explanation:

Once you click on add answer, brainly will take you to something that looks like a note and all you have to do is type the answer and explanation. Once you do that, click on the add your answer button on the top right corner, and your answer will be posted.

16. Which of the following is true about function return statements? A) A function can hold multiple return statements, but only one return statement executes in one function call. B) A function can hold only one return statement. C) A function can hold multiple return statements, and multiple return statements can execute in one function call. D) A function can have maximum of two return statements.

Answers

Answer:

A) A function can hold multiple return statements, but only one return statement executes in one function call

Explanation:

This is because each function can only return one value, whether it be an integer, String, or other object.

However, you can have a series of if-else statements, or case statements, to return a different value depending on information (within parameters, or variables.

Excellent. So, you can have multiple return statements, but the function will only end up executing one of these return statements and return a single value.

Hope this helps!

The statement "When there are multiple return statements but one return statement should execute the 1 function call" is true.

The following information should be considered:

This can be done as every function has only a return i.e. one value. It can be an integer, string, or any other thing. The function can't hold only 1 return statement.The function can't hold many return statements that execute one function call. The function can't have the utmost 2 return statements.

Therefore, we can conclude that option A is correct.

Learn more about the function here: brainly.com/question/12431044

¿Cuál es la ventaja principal de una tabla dinámica?

Answers

Explanation:

Ventajas de las tablas dinámicas de Excel:

Hacen que los informes sean flexibles y se adaptan a tus necesidades. Son una forma interactiva de resumir rápidamente grandes volúmenes de datos, haciendo mucho más fácil el proceso de análisis y permitiendo encontrar patrones o tendencias.

What is the Sparklines group for in Excel? to place charts in individual cells working with hyperlinks selecting font styles or themes formatting the appearance of the cells or tables

Answers

Answer:

A sparkline is a tiny chart in an Excel worksheet cell that provides a visual representation of data.

write a program in python to make the figure:-

*
**
****
********
****************
********************************

The first and correct answer will be marked as brainliest......​

Answers

Answer:

Halo mateeeee

look it will be hard to explain the code and steps to you so just refer this video. .

it will help a lott

( *cries* Serena left Ash In pokemon s19 with a k I s s)

https://youtu.be/rUy_Nq9DHTs

Are all the computer users known as programmer ​

Answers

Answer:

Nope

Explanation:

programmers are diff

What is the output of the following C++ code? int list[5] = {0, 5, 10, 15, 20}; int j; for (j = 0; j < 5; j++) cout << list[j] << " "; cout << endl; Group of answer choices 0 1 2 3 4 0 5 10 15 0 5 10 15 20 5 10 15 20

Answers

Answer:

what?

Explanation:

A java program is composed of data members and functions.​
true or false ?

Answers

Answer:

true

Explanation:

explain about third generation of computer​

Answers

Answer:

The period of third generation was from 1965-1971. The computers of third generation used Integrated Circuits (ICs) in place of transistors. ... This development made computers smaller in size, reliable, and efficient. In this generation remote processing, time-sharing, multiprogramming operating system were used.

Explanation:

hope it helps

What method is used to prevent the random number generator from always starting with the same number?

seed()

random()

randint()

initialize()

Answers

Answer:

seed()

Explanation:

Since computer random isn't actually random, and is a predetermined sequence of numbers, seed() allows us to create different sequences of numbers, and thus more randomized numbers.

Hope this helps!

Answer:

the answer is seed()

Explanation:

i took the assignment

An online retailer is looking to implement an enterprise platform. Which component of the enterprise platform will help the company capture curate and consumer customer information?

Answers

Answer:

Data and Insights

Explanation:

In an enterprise platform, the data and insights are considered as one of the important aspect of any enterprise. It helps in better understanding of the customer so that the enterprise successfully offers best services to the customers.

Data are basically the information that enterprise can gather from the customers and insights are defined by gaining knowledge by analyzing these data so that the company can provide best customer service and it also helps them to capture curate as well as consumer information.

Thus the answer is 'data and insights'.

what are the means of hardware security?​

Answers

Answer:

Hardware security is vulnerability protection that comes in the form of a physical device rather than software that is installed on the hardware of a computer system. ... Common examples include hardware firewalls and proxy servers.

Explanation:

Thank you

Explanation:

Hardware security is vulnerability protection that comes in the form of a physical device rather than software that is installed on the hardware of a computer system. ... Common examples include hardware firewalls and proxy servers.

How can computer be beneficial in agriculture and tourism​

Answers

The production capacity in farming and animal husbandry has increase due to use of computer in agriculture field . There are less losses due to work are monitored by computer. By using computer in traditional field like agricultural field we can increase the productivity and minimize the error happen.

Marcus White has just been promoted to a manager. To give him access to the files that he needs, you make his user account a member of the Managers group, which has access to a special shared folder. Later that afternoon, Marcus tells you that he is still unable to access the files reserved for the Managers group. What should you do

Answers

Answer:

log off of his account and log back in

Explanation:

The first thing that Marcus should do would be to log off of his account and log back in. This is so that the new changes to his permissions can take effect. This should solve his problem and grant him access to all the permissions available in the Managers Group. If this does not work, then it is most likely that he is still in the previous group which has the Manager level permissions blocked. In this case he would need to leave the previous group that he is in because the blocking permissions overrides the access allowed from the Managers group.

If an angry person called and demanded to speak with the executive you support, who is currently unavailable, how would you handle it?

Answers

Answer: be nice no matter how mean or rude the person is.

Explanation: because if you’re not you can get in big trouble or fired.

Answer:

remain  calm during the conversation

How is IT used in entertainment to make cartoon movies

Answers

Answer:

Forensic animation is a branch of forensics in which animated recreation of incidents are created to aid investigators & help solve cases. Examples include the use of computer animation, stills, and other audio visual aids.

hope you will get this answer correct

4) Programming a) WAp to find the greatest number among any three numbers.​

Answers

def comp_num (num1, num2, num3):

try:

if num1 > num2 and num1 > num3:

print ( "{0} is the biggest".format(num1) )

elif num2 > num1 and num2 > num3:

print ( "{0} is the biggest".format(num2))

elif num3 > num2 and num3 > num1:

print ( "{0} is the biggest".format(num3))

except ValueError:

return "Invalid input"

num_1 = int (input (" Please enter a number: "))

num_2 = int (input (" Please enter a second number: "))

num_3 = int (input (" Please enter a third number: "))

print (comp_num (num_1, num_2, num_3))

Answer:

this is in qbasic programming

With respect to using software to build a project network, the authors contention is that... Multiple choice question. Understanding the calculations used is vital to proper use. Software makes up for the need to understand the forward/backward pass calculations and is not necessary for a person to know the pass calculations.

Answers

Answer:

They should have a common start and end node, numbering activity aides clarity, and no "if-then" statements

When constructing a project network for a project with 25-100 tasks, a common industry practice is to

utilize the "yellow sticky" approach

Your help desk has informed you that they received an urgent call from the vice president last night requesting his logon ID and password. You discussed about the call with the VP today and you got to know he never made that call. What type of attack is demonstrated in the given scenario

Answers

Answer:

Social Engineering Attack

Explanation:

The exploitation of individuals in order to gain confedential information is a Social Engineering Attack. These attacks typically take advanage of one's emotions or they use inpersonaltion to steal data.

read more here: https://www.webroot.com/us/en/resources/tips-articles/what-is-social-engineering

Lmk if this helps! :)

Portable computer, also known as laptop computer, weighing between 4 and 10 pounds is called a. Internet b. Scanner c. Printer d. Notebook computer​

Answers

Explanation:

portable computer also known as laptop computer weighting between 4 to 10 pounds is called a Notebook computer.

The information included in a résumé should always relate to the job objective; if it isn’t related, it shouldn’t be included.

Answers

Answer:

True.

Explanation:

A resume (curriculum vitae) can be defined as a short text-based document that a job applicant use to briefly outline his or her qualifications, abillities and accomplishments, haven completed and obtained an academic certificate. Thus, it is used to briefly outline a person's qualifications, abillities, skills set, and accomplishments, after completing and obtaining an academic certificate such as a bachelor's degree, master's degree, etc.

Generally, all job applicants are required to have a resume (curriculum vitae). This brief and concise document is always requested by human resource managers during the job application process.

Furthermore, the primary way to make a resume persuasive (to convince or inform an action in the minds of the readers - potential employers) is by customizing it to fit each company and position.

Hence, the information included in a résumé should always relate to the job objective; if it isn’t related, it shouldn’t be included.

This ultimately implies that, job applicants are expected to tailor their resume to fit or match the position that is advertised by a company's human resources department.

20 points!!!!! Plz answer quickly

Answers

Answer:

other words are not clear

Other Questions
Whats the rate of change please help PLEASE HELP ASAP FAST Answer anyone ? Tyia :) Write an expression for the area of the square below.4x + 2A. 8x2 + 16x + 4B. 16x2 + 16x + 4C. 8x + 4D. 16x2 + 6x + 4Help How is machines an example of the concept of globalization Good themes for the book thief by Markus zusak. Exercise 1: Choose the most suitable word or phrase 1. He has been very interested in doing research on _______ since he was at high school. a. biology b. biological c. biologist d. biologically 2. Are you sure that boys are more _______ than girls? a. act b. active c. action d. activity 3. You are old enough to take _______ for what you have done. a. responsible b. responsibility c. responsibly d. irresponsible 4. These quick and easy _______ can be effective in the short term, but they have a cost. a. solve b. solvable c. solutions d. solvability 5. He was looking at his parents _______, waiting for recommendations. a. obey b. obedience c. obedient d. obediently 6. The interviews with parents showed that the vast majority were _______ of teachers. a. support b. supportive c. supporter d. supporting 7. It is _________ of you to leave the medicine where the children could get it. a. care b. caring c. careless d. careful 8. For ________ reasons, passengers are requested not to leave any luggage unattended. a. secureb.securely c. security d. securing 9. The leader of the explorers had the great _______ in his native guide. a.confident b. confidencec.confidentiald.confidentially 10. We are impressed by his _________ to help us with the hard mission. a. will b. willing c.willingness d. willingly Exercise 2: Use the proper form of the word in parentheses to fill in the blank. 1. She acted in passive _______ to her managers directions. (obedient) 2. She was very ________ during my fathers illness. ( support) Going to university has made her more ________. (confide) 3. We hope the difficulty can be _______by getting the two sides together to discuss the issues. (solution) 4. Can I rely on you to behave ________ when Im away? (responsible) 5. He admitted _________ to smuggle cannabis. (attempt) 6. This story makes a __________ of childrens clothes. (special) What she likes best is to go to the __________ and she her dear little child. (nurse) 7. Not knowing which colour he would like, I have not come to a __________ on what sweater to buy him. (decide) 8. The nurse is always kind and gentle to us. She is a very ______ person. (careful) Exercise 3: Choose the best option 1. People in enjoy _______ time together in the evening when the family members gather in the living room after a day of working hard. a. spending b. caring c. taking d. doing 2. Doctors are supposed to ____ responsibility for human life. a. do b. take c. rush d. join 3. _____ sure that you follow the instructions carefully. a. Believe b. Try c. Do d. Make 4. We are not allowed _______ jeans at school. a. wear b. to wear c.wearing d.worn 5. Sometimes I do not feel like _______ to my sibling about my troubles. a. talk b. to talk c. talking d. talked 6. With greatly increased workloads, everyone is _______ pressure now. a. under b. above c. upon d. out of 7. He was very respectful at home and _______ to his parents. a. responsible b. caring c. obedient d. lovely 8. According to the boss, John is the most _______ for the position of executive secretary. a. supportive b. caring c. suitable d. comfortable 9. Peter tried his best and passed the driving test at the first _______. a. try b. attempt c.doing d. aim 10. She is never willing _______ any personal question.a. answer b. to answer c. answering d. answered q.no. 5 answer me please please please please please please please please please please please A certain standardized test measures students knowledge in English and math. The English and math scores for 10 randomly selected students were recorded and analyzed. The results are shown in the computer output.Which of the following represents the standard deviation of the residuals?1.22334.5578.712124.13I think it's (B), 34.55 Put the following sentences in the correct order to form a logical dialogue What. Is black i will mark as brinelist Narasimha, Madhu and Pavan started a business by investing Rs. 120,000, Rs. 135,000 and Rs. 150,000 respectively. Find the share of Pavan, out of an annual profit of Rs. 56,700. The result of adding 14 to twice a number is the same as subtracting 8 from four times that number. Find that number. 3. Which story events begin to create a sense of mystery and tension? For story, Where is Here Determine the rate of reaction based on the data below:75-rate of reaction = yhydrogen produced (cm)y255075100125time (seconds) The teachers and students roles in the Silent Way method and their roles in the Desuggestopedia method are remarkably different. How different are they? Choose the equation that represents the graph. -8a-5=-7a+3 help someone Which process involves the body maintaining homeostasis? * 7. Interviewing applicants for an important job can be a very time ____________ process but it's worth it in the end. A.Lasting B. Developing C.Consuming D.Taking