1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kisachek [45]
3 years ago
12

Different units of CPU ?

Computers and Technology
1 answer:
deff fn [24]3 years ago
3 0
The two typical components of a CPU include the following:<span>--The arithmetic logic unit (ALU), which performs arithmetic and logical operations. --<span>The control unit (CU), which extracts instructions from memory and decodes and executes them, calling on the ALU when necessary.</span></span>
You might be interested in
Can you create energy?
Katarina [22]
There is a set amount of energy in the universe and you cannot destroy or create energy.
3 0
3 years ago
The Moon appears to be red in color during a total lunar eclipse because of the way light waves pass through Earth’s ___________
Marysya12 [62]

Answer bro must have a mental disorder its like ur thumb HEAT WAVES the  moon becomes red bc of heat waves didnt u say that anyways???

Explanation:

8 0
2 years ago
Read 2 more answers
What is the first thing you should do when you discover a computer is infected with malware? The second thing?
Goshia [24]

Answer:

Quarantine the computer.

Explanation:

Malware can be characterized with negative software capable of causing various damages to a computer, such as theft of data and information, in addition to damage to devices.

In order to avoid having your computer infected with malware, it is essential to have installed reliable malware-checking software, in addition to taking all appropriate security measures when accessing the internet and never clicking on unknown or suspicious links.

Therefore, when realizing that the computer has been infected by malware, it is necessary to quarantine the computer and immediately disconnect from a network so that it does not infect other computers. The quarantine acts as an action where the infected file is moved to an encrypted folder where the malware cannot be executed and spread by the operating system.

3 0
3 years ago
The SQL WHERE clause: Limits the row data that are returned. Limits the column data that are returned. ALL Limits the column and
enyata [817]

Answer: Limits the row data that are returned.

Explanation: In structured query language (SQL), The where clause is used as a filter. The filter is applied to a column and as such the filter value or criteria determines the values that are spared in the column on which the WHERE clause is applied. All rows in which the column value does not meet the WHERE clause criteria are exempted from the output. This will hence limit the number of rows which our command displays.

For instance,

FROM * SELECT table_name WHERE username = 'fichoh' ;

The command above filters the username column for username with fichoh, then displays only rows of Data with fichoh as the username. All data columns are displayed but rows of data which do not match fichoh are exempted.

3 0
3 years ago
Health informatics is an interdisciplinary field which incorporates theory and methodology from fields in computer science. True
noname [10]

Health informatics is an interdisciplinary field which incorporates theory and methodology from fields in computer science is True.

True

<u>Explanation:</u>

To capture patient health information they used interdisciplinary field which is consists patient information and they diseases and cure treatment taken for that patient. All information is store in digital formatted.

The patient information is stored such as health informatics, nurse and doctor treatment, health treatment, medicine details, clinics information.

Health informatics are used to do further analysis on patient health. Doctors are using this information for their further treatment for their patient also.

Information are also can be used as IOT information so that patient information are readily available.

3 0
4 years ago
Other questions:
  • Match the items.
    15·1 answer
  • You wrote a C application that takes 20 seconds using your desktop processor. An improved C compiler is released that requires o
    6·1 answer
  • What can be designed to create annoying glitches or destroy data
    11·1 answer
  • Which of the following is true of information systems?
    15·1 answer
  • Specific keys that each finger is responsible for typing is called A. ergonomics B. Touch typing C. Key reaches D. Posture
    8·1 answer
  • Describe a situation in which a robot may have to avoid an obstacle without coming to a complete stop before turning.
    10·2 answers
  • with the advent of technology one can experience special features such as 3D theater experiences true or false
    8·1 answer
  • Give an example of an occasion when you used logic to solve a problem
    7·1 answer
  • If u play codm pls tell me ur username
    9·2 answers
  • Are there any Potential Dangers in Artificial Intelligence?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!