The amount of RAM that is actually sitting on memory modules in your computer is referred to as ________ memory

Fill in the blank(s) with correct word

physical

Computer Science & Information Technology

You might also like to view...

Which of the following exploits might hide its destructive payload in a legitimate application or game?

a. Trojan program b. Macro virus c. Worm d. Buffer overflow

Computer Science & Information Technology

You can use named constants to make your programs easier to understand by eliminating ____.

A. constants B. variables C. strings D. magic numbers

Computer Science & Information Technology