1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mel-nik [20]
3 years ago
5

The buses that connect peripheral (typically input and output) devices to the motherboard are often called expansion buses. ____

_____________________
Computers and Technology
1 answer:
Dahasolnce [82]3 years ago
3 0

Answer:

True.  

Explanation:

In the following question some information is missing it do not specify which type of question is this So it is a True/False question ,Now coming to the answer .

The main objective of expansion to transfers information between the computer systems such as Central processing unit and the input/output devices. The expansion bus is linking the peripheral devices to the motherboard.

The expansion bus is a set of the cables and the standards which enable the computer system to extend. So the following given statement is true.

You might be interested in
Which of the following, when used in conjunction with hyperlinks, can be useful for easily navigating a Word document? : *
Valentin [98]
Caption is a best answer i hope its work
7 0
3 years ago
Memory chips are used in ____ storage devices to read and write data
MakcuM [25]
Solid state storage?
There are three different types,
Like RAM, ROM, SSS

5 0
3 years ago
You started using a new Windows server three months ago. Since that time, you have found that the system slows down and crashes
Brut [27]

Answer: Open Reliability Monitor.

Explanation:

The simplest way to view this information is to open the reliability monitor.

The Reliability Monitor shows you the stability history of a system at a glance and also allows one to see the details of the events that has an effect on reliability on a daily basis.

The reliability and problem history chart which can be seen in the Reliability Monitor helps in keeping track of the overall health of the server on a daily basis.

4 0
3 years ago
Exchanging which type of data uses the least bandwidth?
Mariulka [41]

Answer:

Voice data uses less bandwidth during exchanging  

Explanation:

The in-network volume of data been transferred between two network points. The data transfer in the network will be heavy and some time it will less.  

It all depends on the end-user data transfers. If end-user transfer media files such as video or bandwidth will be used heavy. If voice data is used then it uses very less.  

Suppose end-user transfer txt file or XML files some it uses very less bandwidth that also depends on file size transfer.

8 0
3 years ago
Which Outlook view should Shane access to schedule a meeting with another individual inside his organization?
AnnyKZ [126]

Answer: the answer is option D.

Explanation:

Firstly, Shane must choose the option "Calendar". In there, she will have to select the time in which she would like to schedule the meeting (by doing double click on the selected time slot).

Secondly, the "Appointment" window will open. In there, Shane will have to complete "Subject" (Rationale of the meeting - e.g. "Performance Review discussion"), "Location" (where would the meeting be held - e.g. Room 5.1, 5th floor), select start time and end time. Within the meeting body, she would be able to detail the high level agenda that the meeting will be carrying on.

Thridly, she will chose the icon "Invite Attendees" and will have to enter the contact's e-mail.

Finally, in order to make sure that the person is available for the selected time, it's always recommended to press the button "Schedulling Assistant" and review if the requested individual has his agenda clear (available) for the meeting.

3 0
3 years ago
Other questions:
  • Which of the following is a geolocation service on an Internet browser?
    5·2 answers
  • Which layer defines an interface that applications can use to request network services, rather than referring directly to applic
    5·1 answer
  • A computer is made of up 6 main components: a) CPU (central processing unit)
    7·1 answer
  • ___________is a security strategy that applies multiple layers of defense because there is an assumption that any single protect
    12·1 answer
  • You should check your battery ___________. Every week Never Every six months Every 30,00 miles
    8·2 answers
  • How can you rotate and resize your drawing?​
    9·2 answers
  • The following is a true example of a computer: A. Toyota Camry
    12·1 answer
  • b. Write a complete program for the following situation related to setting the speed of a car to preset values before starting a
    5·1 answer
  • Refer to the exhibit. Host B on subnet Teachers transmits a packet to host D on subnet Students. Which Layer 2 and Layer 3 addre
    11·1 answer
  • which is a correct procedural step for a webpage to render on a user's browser? an information request is sent to an ip address
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!