1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ruslelena [56]
3 years ago
14

What determines the speed at which your computer performs tasks?

Computers and Technology
2 answers:
egoroff_w [7]3 years ago
8 0
Well there is a couple of things that can go with this subject trust me  i know im a computer geek

well first things first sometimes of what you have downloaded on your computer or loaded onto the drive will sometimes make the computer preform tasks very slowly 

next is a lot of music or documents that can be uploaded or pictures that are uploaded onto the computer when you have those it can cause your electronic devices to run slow also and if you view certain things it can cause viruses on the computer and cause the device to act up and run very slow and it can crash your devices 

I HOPE THAT I HELPED YOU A LOT THANKS SINCERELY BRAINLY..

Arturiano [62]3 years ago
4 0
The CPU is probably the most common
You might be interested in
Why was CDR the most developed country in nepal. Highlight any six reasons​
Elden [556K]

Answer:

6 reasons are highlighted under explanation.

Explanation:

The 6 reasons why CDR region is the most developed in Nepal are as follows;

1) The capital city of Nepal which is named Kathmandu lies in the CDR region.

2) The residents of this CDR region are usually provided with adequate employment facilities.

3) Majority of the industries in Nepal were established in this CDR region.

4) Social facilities which include education and health care are adequately provided in this CDR region.

5) Due to the the many industries, employment facilities and social facilities, this region generates a great amount of the the trade of the country and therefore aids in increasing the size of the economy.

6) There are quite a lot of tourists and religious locations in this region which aids in bringing tourism to the country.

3 0
3 years ago
As it is a good practice that C# broughtback the concept of GOTO statement and Pointer? If your answer isyes then how C# control
zhenek [66]

Answer:

No for GOTO

Yes for Pointer

Explanation:

<u>GOTO statement</u>

This declaration is used to pass control to the program's marked declaration. The label is the valid identifier and is positioned just before the declaration from which the control is transmitted.

It becomes hard to trace a program's control flow, making it hard to comprehend the program logic. Any program in C language can be written without using a GOTO statement.

<u>Pointers</u>

A C # pointer is nothing but a variable holding another type of memory address. However, in C # pointer only the memory address of the value types and arrays can be declared.

C # supports pointers to a restricted extent. Unlike reference kinds, the default trash collection system does not track pointer kinds. Pointers are not allowed to point  to a type of structure containing a type of reference or a type of reference.

During the garbage collection process, the C #garbage collector can move objects in memory as they wish. The C #offers a unique fixed keyword for telling Garbage Collector not to move an item. This implies that the place of the value kinds referred to is fixed in memory. This is called pinning in C #.

8 0
3 years ago
An inner drive to work hard and well is:
Nikolay [14]

A word ethic would be the answer

3 0
4 years ago
What is the best way to delete a program that you downloaded that says that its open but its not opened in your screen? I will g
NNADVOKAT [17]

Answer:

Ctrl+Alt+Del and open Task Manager. Right-click and select End Process. Proceed with uninstalling the program as normal, now that the program has been closed.

Explanation:

7 0
3 years ago
Read 2 more answers
Under which access control system is each piece of information and every system resource (files, devices, networks, and so on) l
Pani-rosa [81]

Answer:

C. Mandatory access control

Explanation:

In the implementation of computer security, the mandatory access control (MAC) refers to the implementation of a security feature by operating systems. In this method, individual resource owners’ are unable to deny or grant permissions to a resources contained in a file. The criteria in a MAC when defined by the system administrator is implemented and enforced by the OS.

7 0
3 years ago
Other questions:
  • If there is no index.html file in the root folder nothing will be displayed when you navigate to the site address
    14·1 answer
  • Show the stack with all activation record instances, including static and dynamic chains, when execution reaches position 1 in t
    14·1 answer
  • PLZZZZZ NEED HELP!!!!!!
    5·1 answer
  • Technologies have advanced to allow computer chips to be placed in almost anything and to be connected to a network almost anywh
    8·1 answer
  • What function should be entered into B7 to calculate the total budget
    15·2 answers
  • Write pseudocode instruction to carry out each of thefollowing computational operations.
    10·1 answer
  • Describe the characteristics of a mesh network.
    13·1 answer
  • What are the two types of commennts of java​
    12·1 answer
  • Dana is moving to a new house. She has 15 boxes for books. Each box can hold up to 22 books. Dana has 375 books. How many more b
    10·2 answers
  • What number is represented as a binary code of 101110
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!