1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fynjy0 [20]
2 years ago
8

List 7 internal components in a computer system

Computers and Technology
2 answers:
MrRa [10]2 years ago
6 0
Motherboard
processor
graphic card
memory
storage
power supply
sound card
vaieri [72.5K]2 years ago
3 0
Hard disk, CD and DVD drives, PCI buses, motherboard, CPU cooled by computer fan, power supply and graphics card in AGP bus.
Hope this helped!
You might be interested in
Which line in the following program contains the header for the showDub function? 1 #include 2 using namespace std; 3 4 void sho
Flura [38]

Answer:

The answer to this question is "15 line".

Explanation:

A function is a block of ordered, portable code used to perform a single, connected operation. The syntax of function declaration can be given as:

Syntax :

returntype functionName(parameter1, parameter2); //function prototype

or declaration

returntype functionName(parameter1, parameter2) //function definition or header of the function  

{  

//function body.

//function implementation

 //return value;

}

In the given question the header of the showDub function is on line 15.

That's why the answer to this question is "15 line".  

8 0
3 years ago
You are a network administrator for a large bagel manufacturer that has 32 bakeries located throughout the United States, United
Anni [7]

Answer:

See the components in explaination

Explanation:

In order to make it as IPv6, few key components should be supported, those components are given below:

The infrastructure must support the enhanced protocol StateLess Address Auto-Configuration (SLAAC).

Static addressing with DHCPv6, dynamic addressing with DHCPv6 and SLAAC are the methods used to configure the IPv6. The network administrator should able to understand and implement the IPv6 through the DHCPv6.

Other than the implementation, working of IPv4 and IPv6 are same. Therefore, the administrator need not to learn new information for its working.

As the IPv6 address length is 128-bit and purpose is for everything on line to have an IP address. It must allow the internet to expand faster devices to get internet access quickly.

The DHCPv6 is not supported by all windows. Therefore, network administrator should check the corresponding Operating system (OS) would support the DHCPv6 for IPv6.

The network administrator must have good knowledge and skills on the IPv6.

The above mentioned key components should be verified by the network administrator in order to support for IPv6 project with DHCPv6.

4 0
3 years ago
How many fnaf games did Scott Cawthon make?
MrMuchimi

Answer:

8 but he is making FNaF security breach

Explanation:

there is FNaF VR help wanted

7 0
3 years ago
PLEASE HELP ME Jimmy and his friends are creating a rock band and have decided to turn his garage into a recording studio. He wa
Tems11 [23]

Answer:

D.  a studio monitor

Explanation:

A studio monitor is an electrical equipment that is used to enhance the quality of sound or music. It work like a speaker that can be used professionals to record audio songs, to make films and some other applications with good quality. It is usually used in studios where producer must ensures that the quality of music. As in music industry the quality of music depends on the quality of instrument used for the purpose of recording.

<em>This is the reason that, Jimmy and his friends should choose a Studio Monitor to achieve the most accurate sound quality.</em>

6 0
3 years ago
What test must you pass to get you're operators licence
Alina [70]
Behind the wheel, the Florida driving test, turn about, shifting gears, parking, backing up, stop quickly, stop signs, signal & turns
5 0
3 years ago
Other questions:
  • Web storage stores data in the browser in
    5·1 answer
  • The gaining of unauthorized access to data in a<br> system or computer:
    11·1 answer
  • How long did it take Linkedln to reach 1 million users?
    5·2 answers
  • How to connect a three way switch to a regilar switch?
    9·1 answer
  • How fast is a backwards long jump in Super Mario 64?
    7·1 answer
  • List safety conditions when downloading shareware, free free where, or public domain software
    14·1 answer
  • What reforms were made by the British government in India after the war of independence? write any three
    5·1 answer
  • 17. Which of the following keyboard shortcut is used to copy the selected text?
    13·2 answers
  • What are the five generations of computer software​
    13·1 answer
  • Debra tracks her business finances in a spreadsheet. She wants to figure out how much she could increase profits if she raises p
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!