A motherboard has two black memory slots and two yellow memory slots. The technician needs to add memory. What should the technician do first?

A) Attach an antistatic wrist strap.
B) Place the computer on an antistatic mat.
C) Read the motherboard documentation.
D) Disconnect power.


C

Computer Science & Information Technology

You might also like to view...

Consider the MustInherit base classes below:

Public MustInherit Class Foo Private a As Integer Public b As Integer Public Sub New( ByVal aVal As Integer, ByVal bVal As Integer ) a = aVal b = bVal End Sub Public MustOverride Function Calculate() As Integer End Class ' Foo Any concrete subclass that inherits class Foo: a) Must implement a method called Calculate. b) Will not be able to access the instance variable a. c) Will not be able to instantiate an object of class Foo. d) All of the above.

Computer Science & Information Technology

What is the purpose of variable length subnet masks?

A) They reduce the number of bits required in a subnet mask from 32 to 24. B) They are the same as classful addressing. C) They are not recommended in modern computer networks. D) They minimize wasted IP address space when interconnecting subnets.

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. The legal and ethical aspects of computer security encompass a broad range of topics. 2. Computer attacks are considered crimes but do not carry criminal sanctions. 3. Computers as targets is a form of crime that involves an attack on data integrity, system integrity, data confidentiality, privacy, or availability. 4. The relative lack of success in bringing cybercriminals to justice has led to an increase in their numbers, boldness, and the global scale of their operations. 5. No cybercriminal databases exist that can point investigators to likely suspects.

Computer Science & Information Technology

A __________ occurs when dynamically allocated memory is not returned when it’s no longer needed.

a) memory leak b) self-referential error c) allocation error d) sizeof error

Computer Science & Information Technology