1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bulgar [2K]
2 years ago
5

What is the function of ALU? ​

Computers and Technology
1 answer:
Murljashka [212]2 years ago
3 0

Answer:

<u>The ALU performs simple addition, subtraction, multiplication, division, and logic operations, such as OR and AND. The memory stores the program's instructions and data.</u>

You might be interested in
What is the part of a file, the .pptx, or .txt etc called?
Lunna [17]
It is called the file extension or filename extension. It is a suffix that indicates the file format.
7 0
3 years ago
Read 2 more answers
Rocks created from compaction and cementation of sediments are called:
Effectus [21]

Answer:

Sedimentary Rocks

Explanation:

Sedimentary rocks are essentially the Frankenstein monsters of the rock world. They're made up of pieces of igneous and metamorphic rocks, sand, clay, and other sedimentary rocks.

4 0
3 years ago
Antiglare screens are sometimes called ____.
yaroslaw [1]
Simply a glare screen, because it clearly states what it protects one against, I guess.
8 0
3 years ago
Projects used for print and web have different ?
mr Goodwill [35]

Answer:

Sizes

Explanation:

6 0
3 years ago
Your employer's right to electronically monitor you is an issue of ____.
Cloud [144]

Answer: Employee privacy

Explanation:

 Employers can electronically monitor property, computer and electronic devices under the their rights in the organization but there is issue of employee privacy. As, employee has the right to privacy in the organization or workplace.

In some organization phones and email address are provided by the company so that they can electronically monitor the employee properly. In this case, some employee feel that monitoring is the violation of their personal  and privacy rights.

8 0
3 years ago
Other questions:
  • Enter a formula in cell b7 to calculate the average value of cells b2:b6
    13·1 answer
  • a. Do you think the U.S. government should censor information on the Web, such as instructions for making weapons, to protect th
    12·1 answer
  • Where in an email would u find information about the action requirements​
    9·1 answer
  • Why are I/O (input/output operations) important in database environment?
    8·1 answer
  • Your it department enforces the use of 128-bit encryption on all company transmissions. your department also protects the compan
    13·1 answer
  • An automatic transmission is a mechanism that _
    7·1 answer
  • Noi needs to send some documents to a client in another company. Which device can she use to make digital copies of the paper fi
    13·2 answers
  • List seven media features that can be used in media queries.
    10·1 answer
  • Which internet explorer security feature restricts the browsing session information that can be tracked by external third-party
    12·1 answer
  • Please answer quick :(​
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!