1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Viefleur [7K]
4 years ago
15

What determines the speed st which your computer perfoms tasks?

Computers and Technology
1 answer:
tamaranim1 [39]4 years ago
3 0

The central processing unit (CPU) is what powers the computer. Any lower-end CPUs will not run a quick-functioning computer very well.

You might be interested in
All of the following are forms of verbal communication except
Radda [10]
B. hand gestures
these are not verbal.
4 0
3 years ago
Read 2 more answers
To build a framework for security policies and controls, one can use the following approach: 1) document the concepts and princi
serious [3.7K]

Answer:

n/a

Explanation:

4 0
3 years ago
Ites and days, on one of the slides in her school presentation. Which element can she use to
Lady_Fox [76]
<h2>Answer:</h2><h3>A text</h3><h3>or</h3><h3>C chart</h3>

8 0
3 years ago
Read 2 more answers
Oracion con punto focal​
gizmo_the_mogwai [7]

Answer: Prayer with focal point

Explanation:

7 0
3 years ago
Address whether each defense method listed above (single router, defense-in-depth, and demilitarized zone) is sufficiently diffe
bagirrra123 [75]

Answer:

Check the explanation

Explanation:

1) The single router approach is a security Implementation of all security policies and the defense-in depth approach employs a firewall. the DMZ approach Is establish between two routers with a firewall.

2) The single router approach is for small offices and homes.

The defense in depth approach is for large organizations.

The DMZ approach is for publicity operated networks.

3) The DMZ can provide better defense because it has more than two firewall for increased security.

5 0
4 years ago
Other questions:
  • If parties in a contract are not _______, the contract can be canceled.
    7·1 answer
  • The wireless spectrum, as defined by the fcc, spans between which two frequencies?​
    7·1 answer
  • Neighbor discovery performs many of the functions that icmp router discovery and icmp ____ handled in ipv4.
    13·1 answer
  • Monetary Policy can be either Expansionary or Contractionary. Which of the following actions classify as Expansionary Monetary P
    7·2 answers
  • For most applications, saving sound files at the _____ bit resolution provides a good balance of sound quality and file size.
    15·2 answers
  • Rachelle's computer has frequent system crashes and it takes a long time to access files and folders. What hardware component is
    8·1 answer
  • Who prime minister of india​
    9·2 answers
  • How does porter’s competitive forces model help companies develop competitive strategies using information systems?
    13·1 answer
  • if prakash gives one of the marble from what he possessses to kamala then they will have equal number of marbles.if kamala gives
    10·1 answer
  • Is a list of instructions an arguments?<br> Yes or No
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!