1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
WARRIOR [948]
3 years ago
7

A computer is made of up 6 main components: a) CPU (central processing unit)

Computers and Technology
1 answer:
aleksandrvk [35]3 years ago
4 0

Answer:

False

Explanation:

The computer is an digital device that access, process and displays the output of data. It is a device with hardware components run by software (operating system) through kernel utilities (device drivers).

The main components of the computer system are input unit, output unit, processor and memory unit. Every other components are termed peripheral devices.

You might be interested in
We can harden a host by: a. Limiting physical access to it b. Turning off unnecessary services c. Installing patches d. All of t
Rina8888 [55]

Answer:

D

Explanation:

All three of A, B and C are required to harden a host. Thus, All of the above makes the best option.

Hardening simply refers to making your data impossible to be penetrated. More like bulletproof.

To do this, ensure measures like

- Regular Program cleanup

- Patches management

- service pack installation

- service or usage policies

...among others.

Cheers

3 0
3 years ago
True or false: all blockchains are programmed to have the same block time (confirmation time) as each other.
wariber [46]

Answer:

False

Explanation:

<em>The complexity of the hash, which is the hexadecimal number produced by the hashing process, determines the precise length of time required for block production. Thus, block times won't always be the same.</em>

4 0
2 years ago
When do you use FTP?
Sergeeva-Olga [200]
FTP (File Transfer Protocol) can be used for a variety of tasks. For instance, webmasters using FTP for pushing updates/files to their websites can provide easy and straightforward changes to their services without the need to physically transfer files onto the host server. FTP should be used when you must update a file or files on a host server for a variety of reasons and you do not have access to the host server physically. However, FTP also has some inherent security risks which is why some webmasters/hosts chose to opt out of pushing updates through FTP in favour of physical file transfer.
5 0
3 years ago
Read 2 more answers
A technician needs to be prepared to launch programs even when utility windows or the Windows desktop cannot load. What is the p
lisov135 [29]

Answer:

Windows includes a tool called Microsoft System Information (Msinfo32.exe). This tool gathers information about your computer and displays a comprehensive view of your hardware, system components, and software environment, which you can use to diagnose computer issues.

Explanation:

7 0
3 years ago
Save an image as a separate file by right-clicking the image and then clicking this option at the
Olenka [21]

Answer:

Save image as

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • An OS X backup utility that automatically backs up files to a dedicated drive that is always available when the computer is turn
    6·1 answer
  • What determines how large the crystals in an igneous rock will be?
    15·2 answers
  • According to Fourman, Informatics is _______________ with a very _____________ scope.
    5·2 answers
  • What is the single most important component of a computer? Central Processing Unit DIP Motherboard Chipset
    8·1 answer
  • Fill the validateForm function to check that the phone number contains a number (use the isNaN function) and that the user name
    8·1 answer
  • What kind of server connects a remote system through the internet to local serial ports using tcp/ip?
    9·1 answer
  • Your program will search for prime numbers. You will first ask the user for the range of values to search, and use for loops to
    6·1 answer
  • What are the pros and cons of being a single decision maker
    8·1 answer
  • You can use this keyboard shortcut to toggle the visibility of the command line. If for some reason your command line is hidden
    7·1 answer
  • 1. The NetworkManager or Systemd Networkd components must be installed on a Linux system in order to configure an IP address on
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!