1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ddd [48]
1 year ago
12

The main components of a computer ar a hardware and software b) disc and monitor c) system and unit d) communication devices. ​

Computers and Technology
1 answer:
yulyashka [42]1 year ago
3 0
Option A is the main component
You might be interested in
The Java compiler does not check for an ArrayIndexOutorBoundsException during the compilation of a program containing arrays. O
yulyashka [42]

Answer:

TRUE

Explanation:

  • Let us first understand what is an ArrayIndexOutOfBounds Exception.
  • As the name itself suggests the index for the array has gone out of bound (permissible value) and an exception (anamoly) is resulted.
  • So, it throws an error.
  • That means if an array, Employee of size n is defined then the permissible elements are Employee[0] to Employee[n-1]. If any negative index or with the index is greater than n-1 is tried to access it throws an error saying ArrayIndexOutOfBounds Exception.
  • In java, during the compilation of the program the compiler doesn't check for the ArrayIndexOutOfBounds Exception.It checks during running the program.
  • So, it is called a Runtime Exception.
7 0
3 years ago
Java write code that inserts useritems into the output string stream itemsoss until the user enters "exit". each item should be
Step2247 [10]
If you're a zybooks user.

itemsOSS.print(userItem + " "); 
      userItem = itemCharStream.toString();
4 0
2 years ago
Read 2 more answers
Suppose data is available for an on-line music distributor. This data includes: song title, artist performing the song, date son
garri49 [273]

Answer:

The answer is "Option a".

Explanation:

In this question, the only choice "a" is correct because in the question it is declared that it includes: your track title, the performance artist, the date their track is bought, the fee for the track. Its number of music purchased by a given artist on a particular date is based only on details available on the distributor's song title, performing, date purchased, the sum paid.

5 0
3 years ago
HELPPP! MARK YOU THE BRAINLIEST!
bogdanovich [222]

Answer:

My goal is to have good grades because I failing now and I want to try and try to get my grade up if I do I will be successful and when I grow up I will have a good job and a better life for me and my family.If I success my life will be so different.

5 0
2 years ago
What is a single instruction that inverts bits 5 and 6 in bl without changing any other bits?
slamgirl [31]
You want to XOR the register contents with the value 0x60 (a hex word with bits 5 and 6 set).
Not sure how to write that in x86 assembler, is it:

xor bl, 0x60
7 0
3 years ago
Other questions:
  • Difference between volatile and non volatile memory
    14·2 answers
  • Microsoft has developed the Active Directory Domain structure so that a central authority, called the __________, is the reposit
    7·1 answer
  • ASAP FAST PLSKara is currently creating a storyboard for her web site. Which step of the web design process is she in? Coding Pl
    9·2 answers
  • The function below takes two numeric parameters. The first parameter specifies the number of hours a person worked and the secon
    13·1 answer
  • How is science and technology used in the society​
    11·1 answer
  • Which computer can perform the single dedicated task? a. Which commuter can perform the function of both analog and digital devi
    6·1 answer
  • 1. A bank customer invested $24 in a bank with 5 percent simple interest per year, write a program the construct a table showing
    11·1 answer
  • ....is an act of introducing an invention into market on business basis for profit​
    12·1 answer
  • Which reports indicate how traffic arrived at a website?.
    6·1 answer
  • which one of the following would not normally be found in an organization's information security policy?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!