1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dmitriy555 [2]
2 years ago
14

in addition to hardware, software, data, and procedures, the fifth major component of a computer system are codes.

Computers and Technology
1 answer:
BartSMP [9]2 years ago
5 0

The given statement is false because the five major components of a computer system are hardware, software, data, procedures and telecommunications. Code is not a component of a computer system. It is a set of instructions given to a computer to perform different actions.

Computer information systems or simply computer systems are systems which are composed of people, computers and intercommunications among them. These systems are used to collect, store, and process data, primarily within an organizational setting.

A brief description of each component of computer systems is given below:

  1. Hardware: It represents all the physical elements of computer systems that work with information.
  2. Software: This component includes all sets of instructions required to process data and information.
  3. Data: All data that the other components work with resides on this component.
  4. Procedures: They include all the procedures that human resource use in order to retrieve useful information from the bulk of data.
  5. Telecommunication: The component telecommunications consists of communication media and networks. This component joins the hardware devices together to establish telecommunication connections. Connections can be wireless or through wires.

You can learn more about components of computer information system at

brainly.com/question/14453719

#SPJ4

You might be interested in
An attacker obtains a connection to your LAN and then uses SETH to perform a MiTM attack between your system and the company RDP
maxonik [38]

The type of attack which has occurred in this scenario is known as credential harvesting.

<h3>What is credential harvesting?</h3>

Credential harvesting is also known as account harvesting and it can be defined as a type of attack that involves the use of the following techniques to illegally obtain large numbers of user credentials (username or password):

  • MITM attacks
  • DNS poisoning
  • Phishing

In conclusion, the type of attack which was used in this scenario is known as credential harvesting.

Read more on phishing here: brainly.com/question/23850673

#SPJ1

3 0
2 years ago
TRY IT Choose the Right Technology MP3 player Widescreen laptop computer Smartphone Tablet computer with wireless Internet Suppo
Gnoma [55]

is this like a story or sum

3 0
3 years ago
Read 2 more answers
Write a C program to perform simple C arithmetic calculations. The user is to enter a simple expression (integer operator intege
Ilya [14]

Answer:

Input example:

select the funcion: 1                                                                                                                  

write the 1sd number2                                                                                                                  

write the 2nd number1                                                                                                                  

value is 2.000000                                                                                                                      

Explanation:

#include <stdio.h>

main()

{

//define the variables as float

float a, b, c, e;

char d;

while (1)  

{      

//input values

printf("select the function: ");

scanf("%c",&d);

printf("write the 1sd number");

scanf("%f",&a);

getchar();

printf("write the 2nd number");

scanf("%f",&b);

getchar();

if (d=='%')

{

    a=a*b/100;

}

if (d=='*')

{

    a=a*b;

}

if (d=='+')

{

    a=a+b;

}

if (d=='/')

{

    a=a/b;

}

if (d=='-')

{

    a=a-b;

}

printf("value is %f \n",a);

}

printf("final value is %f",a);

getchar();

}

8 0
4 years ago
Generally speaking, what is a “best practice"?
miss Akunina [59]

Answer:

What’s up, I’m currently in this class, and I was wondering if it’s easy or hard?

Explanation:

3 0
3 years ago
In Adobe illustrator cc 2017 which of the following export file ​
eduard

Explanation:

In Adobe illustrator cc (2017) , of the following export file formats cannot preserve transparency

8 0
3 years ago
Other questions:
  • Allows you to manually add an entry to the arp cache that resolves the ip address inetaddr to the physical address etheraddr. wh
    13·1 answer
  • Please answer quick:))))
    7·1 answer
  • Stacey wants to change her document to landscape view instead of portrait. Jesse wants to change the scale of his document. Whic
    5·1 answer
  • Write the name of the tab, the command group, and the icon that you need to use to justify text
    9·1 answer
  • Which of the following is not one of the Generally Accepted Recordkeeping Principles ("The Principles®")? a. Accountability b. S
    11·1 answer
  • Why do we need IP Addresses in order for the Internet to function properly?
    7·1 answer
  • Type the correct answer in each box. Spell all words correctly.
    12·1 answer
  • I don’t understand this, i need help
    7·1 answer
  • True or false: Concurrent validation is more time consuming to measure than predictive validation because it involves a wait per
    13·1 answer
  • Tools used to build a bridge<br>​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!