1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
asambeis [7]
2 years ago
13

Which things computer case contains

Computers and Technology
1 answer:
omeli [17]2 years ago
3 0

Inside the case are the components that make up the computer itself, such as the RAM memories, the processor and the hard disk, all of which are directly or indirectly connected to the motherboard. In addition, the case allocates the power suplly, which is responsible for supplying power to the computer.

<h3>What is a computer case?</h3>

The case is the hardware component used to house most parts of a computer. It is inside it that components such as CPU, motherboard, SSD, video card and power supply are placed.

In addition, it is where the outputs for connections to other equipment are found, such as USB and HDMI outputs, plug for sound box and microphone and input for memory card.

The case has the important function of protecting the internal components of a computer from knocks, heat, light, moisture and dust. That's because most of the electronic components inside a computer are very sensitive and need this protection.

It is also used to connect to other hardware components, such as a monitor, keyboard, mouse and headset, through the various outputs provided on its exterior.

See more about computing at: brainly.com/question/15707178

#SPJ1

You might be interested in
In a clustered column chart, the names of each column are part of the ____ series. select one:
Ratling [72]
Data.......;...............;.........;......;.
4 0
3 years ago
Read 2 more answers
A method signature for a method consists of all elements of the method except the body. That is, a method signature consists of
Bess [88]
To be honest I feel like it’s B that’s looks and seems the most correct to me
8 0
3 years ago
Crystal inc. is a multifaceted company that deals with the mining, cutting, and selling of diamonds. It gives distributors and s
Ostrovityanka [42]

Answer:C)Extranet

Explanation: Extranet is the network on private basis for sharing of the organizational information with the vendors, employees, customers,suppliers etc. It uses the internet service for the distribution of the data outside of the company in extended form.Electronic data interchange is used for exchanging of large amount of information.

Other options are incorrect because intranet is the internet service which works within enterprise, chaosnet is protocol for transmission of data in full duplex form and ethernet is the communication with the help of protocol in traditional manner.

5 0
4 years ago
To the nearest​ millimeter, a cell phone is 7878 mm long and 3434 mm wide. What is the ratio of the width to the​ length?
Darina [25.2K]

Answer:

1:2

Explanation:

Width : Length

3434 : 7878

= 1 : 2.294

= 1 : 2 (to the nearest mm)

8 0
3 years ago
Chris needs to take the opposite of a Boolean value. Which operator does so:
alina1380 [7]
B is the best answer
5 0
3 years ago
Other questions:
  • Proxy data:
    12·1 answer
  • How do I convert a number into a percentage in excel
    7·1 answer
  • A display that is thin, flexible, light, and easy to read in all types of light is
    9·2 answers
  • Which data table display compares report metrics to the website average?
    6·1 answer
  • Let’s say you are given a number, a, and you want to find its square root. One way to do that is to start with a very rough gues
    15·1 answer
  • WILL GIVE BRAINLIEST TO HELPFUL ANSWERS!
    8·1 answer
  • The if statement regards an expression with the value 0 as __________.
    13·1 answer
  • A(n) ________ is a way of retrieving information from one or more tables that defines a particular subset of data.
    6·1 answer
  • Which of the following protocols is used by an email client to retrieve messages from an email server, giving users the option t
    11·1 answer
  • a transport layer security (tls) virtual private network (vpn) requires a remote access server listening on port 443 to encrypt
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!