1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
murzikaleks [220]
2 years ago
15

If the cpu is fast but the bus speed is slow, that condition is called?

Computers and Technology
1 answer:
yanalaym [24]2 years ago
5 0
A slow processors but the need more bytes
You might be interested in
A client has macular degeneration resulting in moderate visual impairment. The client works as a data entry clerk and wants to c
weqwewe [10]

Answer:

Low Vision Aid for Computer Users

Explanation:

Visually impaired people can use the same low vision aids for viewing a computer screen as they do for regular reading activities. These include eyeglass-mounted magnifiers, handheld magnifiers and stand-alone magnifiers.  But also, special software has been developed to display content on the screens of computers and other digital devices in large print. Other applications can read text and other visual content aloud with a synthetic voice.  These adaptive low vision devices let partially sighted people do the same computer-related tasks as fully sighted people — such as word processing, creating and using spreadsheets and viewing web pages online.

4 0
3 years ago
Multiple Choice
anygoal [31]

Answer:

cyptographically

Explanation:

Did this question and got it right. Good luck!

6 0
2 years ago
To keep information beyond reach of unauthorized users, is to keep the information _____. Group of answer choices simple verifia
nasty-shy [4]

Answer:

Secure is the correct answer for the above question.

Explanation:

  • When any person wants that any information is not hacked by any user then he needs to secure the information with the help of any security mechanism. This security mechanism can be of any type that facilities the user to stop the information are being hacked.
  • The above question asked about the work which is needed to stop the message is being hacked. So there is a need to secure the information. so secure is the correct option while the other option is not valid because "simple, economical or verifiable" can not stop the message from accessed by the unauthorized user.
7 0
3 years ago
Sandy's keyboard is not inputting data into her computer which key should she press to verify it is connected to her computer...
Ksivusya [100]

Answer:

Windows key,capslock key for verify connectivity

Explanation:

Sandy's can verify whether her keyboard is working or not by pressing the windows key. Caps Lock and Num lock key will turn on the light on keyboard and she shall see whether her keyboard is functioning or not. This method is being used everywhere to verify the keyboard connectivity.The light function can also be checked by using Caps Lock or Num lock key as well. Some keyboard offers the in built light, which can be turned on by pressing Alt+Space bar.

5 0
3 years ago
Some email programs let you use a ____ to move incoming mail to a specific folder or to delete it automatically based on the con
KatRina [158]

Answer:

filter

Explanation:

Some email programs let you use a filter to move incoming mail to a specific folder or to delete it automatically based on the content of the message.​

The filter performs this role by either automatically deleting or moving to another location.

Most messages that are moved or deleted are unsolicited emails or spam messages.

Filtering of your mails helps so you ou can manage your incoming mail using filters to send email to a label, or archive, delete, star, or automatically forward your mail.

This is a way of organising your correspondence.

6 0
3 years ago
Other questions:
  • Morgan is the operations manager for a national appliance distributor. The company has offices throughout the United States. Com
    7·1 answer
  • GenXTech is a growing company that develops gaming applications for military simulations and commercial clients. As part of its
    9·1 answer
  • Indexed sequential access, an index is more useful when the number of record is
    10·1 answer
  • What are options in the Advanced tab in the Share Workbook dialog box? Check all that apply.
    14·2 answers
  • Impanation stage contain ​
    10·1 answer
  • Prepare a risk assessment report (RAR) with information on the threats, vulnerabilities, likelihood of exploitation of security
    14·1 answer
  • Why should the drives be segregated in a computer?​
    15·1 answer
  • A row in a table _____? for computer class and i’m in the middle of a test!
    14·1 answer
  • Why is operating system important software for computer?give 3 reasons
    8·1 answer
  • If a person communicates indirectly and attaches little value to
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!