Explanation of Solution
Current memory modules:
The following are the current memory modules used to increase the memory capacity...
Explanation of Solution
Differences of memory modules:
The following table represents the currently used memory modules and its differences based upon the type, size, speed and price.
Characteristics | SIMM | DIMM | RIMM |
Type | The memory board uses 30 pin connector types. | The memory board uses 168 pin or 184 pin connector type. |
The memory board uses 168 pin connector type. |
Size | It is about |
Explanation of Solution
Recommendations to upgrade laptop’s memory:
Based upon the expert’s knowledge from the industry, the following are the methods and recommendations to upgrade the laptop’s memory,
- Initially, check how much memory is available on the laptop to avoid the bottle necks of the computer.
- Open the “Windows Task manager” and in the “Task manager” tab, it shows how much memory is used out of total memory.
- For more detailed view, there is an option “Open Resource monitor” in the Task manager window that shows the amount of physical memory available in the laptop.
- Next, check whether the laptop can be upgraded or not...
Explanation of Solution
Type and amount of memory for laptop:
- There is an application called “Crucial system scanner” which is need to be downloaded based upon the terms and conditions.
- After downloading and executing the application, it displays some of the re...
Explanation of Solution
Reason for not purchasing more memory on laptop:
Even though the computer is supported for more memory, the mother board supports for limited amount of memory or else the memory would not work.
- On each motherboard, there is a controller to access the Random Access Memory (RAM). So, there will be a limiting factor to access the memory by that controller...
Explanation of Solution
Available slots in memory modules:
The following are the simple steps to check the available slots in the laptop,
- First open task manager in “Run” command.
- Then select “performance” tab and click on the “memory section”...
Explanation of Solution
Safety measures:
While upgrading the memory in laptop, there will be a chance of electrostatic discharge and to avoid this, let need to ground the component and this can be achieved by the following safety measure...
Explanation of Solution
Better option:
Actually, this is a complex decision to take whether the laptop is needed to be upgraded or replaced. This is because,
- Some of the different component in the laptop is not an easy process to replace, but it is possible to upgrade the laptop if some of the proper tools are available.
- Moreover, the user requires little patience to upgrade the laptop...
Trending nowThis is a popular solution!
Chapter 6 Solutions
EBK ENHANCED DISCOVERING COMPUTERS & MI
- Find the error: daily_sales = [0.0, 0,0, 0.0, 0.0, 0.0, 0.0, 0.0] days_of_week = ['Sunday', 'Monday', 'Tuesday', 'Wednesday', 'Thursday', 'Friday', 'Saturday'] for i in range(7): daily_sales[i] = float(input('Enter the sales for ' \ + days_of_week[i] + ': ')arrow_forwardFind the error: daily_sales = [0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0] days_of_week = ['Sunday', 'Monday', 'Tuesday', 'Wednesday', 'Thursday', 'Friday', 'Saturday'] for i in range(6): daily_sales[i] = float(input('Enter the sales for ' \ + days_of_week[i] + ': '))arrow_forwardWhat are the steps you will follow in order to check the database and fix any problems with it and normalize it? Give two references with your answer.arrow_forward
- What are the steps you will follow in order to check the database and fix any problems with it? Have in mind that you SHOULD normalize it as well. Consider that the database offline is not allowed since people are connected to it and personal data might be bridged and not secured. Provide three refernces with you answer.arrow_forwardShould software manufacturers should be tolerant of the practice of software piracy in third-world countries to allow these countries an opportunity to move more quickly into the information age? Why or why not?arrow_forwardI would like to know about the features of Advanced Threat Protection (ATP), AMD-V, and domain name space (DNS).arrow_forward
- I need help to resolve the following activityarrow_forwardModern life has been impacted immensely by computers. Computers have penetrated every aspect of oursociety, either for better or for worse. From supermarket scanners calculating our shopping transactionswhile keeping store inventory; robots that handle highly specialized tasks or even simple human tasks,computers do much more than just computing. But where did all this technology come from and whereis it heading? Does the future look promising or should we worry about computers taking over theworld? Or are they just a necessary evil? Provide three references with your answer.arrow_forwardWhat are the steps you will follow in order to check the database and fix any problems with it? Have in mind that you SHOULD normalize it as well. Describe in full, consider the following:• Taking the database offline is not allowed since people are connected to it.• Personal data might be bridged and not secured. Provide three refernces with you answerarrow_forward
- Enhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage Learning