The amount of RAM that is actually sitting on memory modules in your computer is referred to as ________ memory
Fill in the blank(s) with correct word
physical
Computer Science & Information Technology
You might also like to view...
Which of the following exploits might hide its destructive payload in a legitimate application or game?
a. Trojan program b. Macro virus c. Worm d. Buffer overflow
Computer Science & Information Technology
You can use named constants to make your programs easier to understand by eliminating ____.
A. constants B. variables C. strings D. magic numbers
Computer Science & Information Technology