1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LenKa [72]
2 years ago
6

* Describe the five components of a computer

Computers and Technology
2 answers:
r-ruslan [8.4K]2 years ago
7 0

Answer:

I don't know mad ask to your mother or father mad

LenaWriter [7]2 years ago
5 0

Answer:

Computer systems consist of three components as shown in below image: Central Processing Unit, Input devices and Output devices. Input devices provide data input to processor, which processes data and generates useful information that's displayed to the user through output devices. This is stored in computer's memory.

You might be interested in
How can you efficiently restrict the read-only function of a requesting SNMP management station based on the IP address?
mezya [45]

Answer:

Place an ACL on the line when configuring the RO community string.

Explanation:

Controlling Access via SNMP

SNMP is a protocol used by network management systems to monitor and control network-attached devices. Ciscoworks, HP Openview, and other management stations all use SNMP.

SNMP access can be granted on a network device in two ways—read-only and read-write. Read-only access allows the management station to poll the device for statistics and other information, but it does not allow anything to be changed. Read-write access allows the management station to make changes to the configuration of the device.

It's obviously a good idea to make sure you trust the devices allowed to make changes to your configuration, but some versions of SNMP use only a simple shared password to permit access. To make this more secure, an ACL can be applied, which limits the source IP addresses that can use SNMP.

8 0
3 years ago
What are the factors that affect self-confidence?
denis-greek [22]

Answer:

The factors that affect self confidence are not having enough faith in yourself and letting what others say about you put you down

Explanation:

Plz mark brainlest it will help me so much

5 0
2 years ago
Why is computer science hardware needed to solve problems with computers?
dybincka [34]

Answer:

Computer science is the study of problems, problem-solving, and the solutions that come out of the problem-solving process. Given a problem, a computer scientist's goal is to develop an algorithm, a step-by-step list of instructions for solving any instance of the problem that might arise. ... Algorithms are solutions.

Explanation:

#CarryOnLearning

3 0
2 years ago
W-11/6=4<br><img src="https://tex.z-dn.net/?f=%20%20%5Cfrac%7Bx%20-%2011%20%7D%7B%206%7D%20%20%3D%204" id="TexFormula1" title="
kozerog [31]

step 1, multiply by 6:

x-11 = 4*6 = 24

step 2, add 11:

x = 35

7 0
3 years ago
One critique of determining the effectiveness of the psychodynamic perspective is that its theories are too vague to test. t/f
Feliz [49]
TRUE

Psychodynamic theories are usually too vague to allow a clear scientific test. Modest support for central psychodynamic hypotheses has been provided by Empirical studies. Critics have in the past disputed very many aspects of psychoanalysis including whether it is indeed a science or not. However much this is so, psychoanalysis is a great idea in personality that should never be overlooked.






3 0
3 years ago
Read 2 more answers
Other questions:
  • 1) If a client requests timestamping every two minutes, how would it look? a) [00:02:00] b) [00:06:00] c) (00:04:00)
    15·2 answers
  • Troubleshooting a printer that does not work includes a. connecting the printer to your computer b. checking to see if there is
    13·1 answer
  • What does the rule of five say?
    12·2 answers
  • Traffic that is encrypted will typically pass by an intrusion prevention system untouched.a. Trueb. False
    10·1 answer
  • After you set a pin for a domain account on your laptop, that pin can be used only on your laptop. question 17 options:
    7·1 answer
  • Which of the following is true of how the Internet has responded to the increasing number of devices now using the network?
    7·1 answer
  • For large and complex amounts of information, storing the information is best achieved by using what?
    5·1 answer
  • Who distributes IP Address?
    10·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    15·2 answers
  • Which are aspects of the post-production stage?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!