1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fredd [130]
3 years ago
10

In a microprocessor, the __________ fetches instructions.â âalu âregister âcpu âcontrol unit

Computers and Technology
1 answer:
solong [7]3 years ago
5 0
<span>The control unit is responsible for getting instructions. This is the part of the processor that receives signals and directs them to all other parts of the unit, such as the ALU, I/O devices, and the memory on how to respond to program code.</span>
You might be interested in
if image size and resolution are the same, which file format, .jpg, .gif, .or .tiff, will give you the smallest file size?
dimaraw [331]
.jpg will be the smallest size
3 0
3 years ago
Read 2 more answers
2a
zmey [24]

Answer:

See explaination

Explanation:

2a)

A hacker group hacked into the Bay Area Rapid Transit system, this was done to protest BART’s shut down of wireless communication in some BART stations. Such attacks is done mostly to stand for some situation which happened previously. Hence, we can say it is a form a hacktivism. It was not ethical as it disrupted the system for some time.But this is also a form of protest which is been done by some group of peoples.

2b)

If a foreign government launches a hacking attack, it can be considered a war.

If this type of attack happens then the repercussions may result to the war.

2c)

We gave an analogy between merchants accepting some amount of shoplifting, on the one hand, and merchants and credit card companies accepting some amount of credit card fraud, on the other hand.

THe streght so called can be pointed out as the money is rolling in the market and the business keeps on going.

The weakness can be described as the loss which is being incurred by the company.

7 0
3 years ago
A U.S. social security number consists of a string of 9 digits, such as "444422333". Assume that input consists of a sequence of
harkovskaia [24]

Answer:

767745089

Explanation:

6 0
3 years ago
Read 2 more answers
Which protocol below is used by email clients to send email
Alex17521 [72]
Did you forget the picture?
6 0
3 years ago
Naruto Uzumaki who likes naruto ??? who waches it??
nika2105 [10]

Answer:

me

Explanation:

naruto is the coolest dude

6 0
3 years ago
Read 2 more answers
Other questions:
  • Write a function so that the main() code below can be replaced by the simpler code that calls function MphAndMinutesToMiles(). O
    5·1 answer
  • Computers have become easier to use and more powerful over time.
    12·2 answers
  • Drag the tiles to the correct boxes to complete the pairs. Match the tools that you can use while solving a problem with their c
    6·2 answers
  • Import java.util.scanner; public class sumofmax { public double findmax(double num1, double num2) { double maxval; // note: if-e
    10·1 answer
  • In a relational database design, all relationships are expressed by ________.
    10·1 answer
  • What are three reasons teens might start drinking alcohol??
    7·2 answers
  • How are additional slides added to presentations? select all that apply
    10·1 answer
  • By
    7·1 answer
  • Please help me
    7·2 answers
  • ____ is an easy way to invitation through a web page​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!