1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
WARRIOR [948]
3 years ago
7

A computer is made of up 6 main components: a) CPU (central processing unit)

Computers and Technology
1 answer:
aleksandrvk [35]3 years ago
4 0

Answer:

False

Explanation:

The computer is an digital device that access, process and displays the output of data. It is a device with hardware components run by software (operating system) through kernel utilities (device drivers).

The main components of the computer system are input unit, output unit, processor and memory unit. Every other components are termed peripheral devices.

You might be interested in
Bert started off his working life as a typesetter for a print house. With the advent of new technologies, Bert's job became redu
Inessa [10]

Answer:

Berth's job became redundant because she lacks the computing skills. Perhaps, she has been using manual or analog type writing machine to do her job and was doing it well but with the advent of computer that replaces analog type writer, she will become redundant.

Explanation:

She needs to learn how to use the computer to type and do her job efficiently in the print industry.

5 0
3 years ago
A ____ is a key-dependent, one-way hash function that allows only specific recipients(symmetric key holders) to access the messa
Alexxx [7]

Answer: (C) MAC

Explanation:

MAC is stand for the message authentication code and it is one of the key dependent hash function. Message authentication provide the data integrity and also the origin of data authentication.

  • It basically allow the specific recipients known as the holder of the symmetric key.
  • The message authentication code uses the CBC (Cipher block chaining) mode for constructing the MAC algorithm and it also uses the block cipher for the conjunction by using the CBC operations.    

On the other hand, all the options are incorrect as they are not the key dependent hash function.

Therefore, Option (C) is correct.

7 0
3 years ago
#5 Multiple Select Which of the following describes a hardware error? Select 3 options.
DENIUS [597]

Answer:

A, E

Explanation:

Hope this is correct

7 0
3 years ago
Read 2 more answers
I need help in Jumbotron: Paragraph. The question is:
Aleksandr-060686 [28]
<span>.jumbotron p
{
color: #fff;
font-size: 20px;
}</span>
6 0
3 years ago
Technician A says that Teflon sealing rings require special tools for proper installation. Technician B says that warming a Tefl
bezimeni [28]

Answer:Both Technicians A and B are correct.

Explanation:Teflon is a florinated polymer it is polytetrafluroethylene (PTFE). It is widely used in different fields and the making of materials for both home and industrial use. Teflon rings does requires special tools for proper installation which is called TEFLON RING INSTALLER.

Warming the a Teflon ring in water or oil at 130-140°F for about 5 minutes will help to soften the material for easier installation. cover wear ring grooves with plastic tape.

8 0
3 years ago
Other questions:
  • Which one of these students is having a positive impact?
    8·2 answers
  • The __________ vulnerability assessment is a process designed to find and document selected vulnerabilities that are likely to b
    15·1 answer
  • Which statement pertaining to system reliability is FALSE? Select one: A. Having the latest version of software products can mak
    15·1 answer
  • You have the templates of 2 classes, Person and Program. The Person class has 4 attributes, name, age, major and gpa. There is a
    7·1 answer
  • How can you employ one of the most powerful interactive business tools on the Internet today?
    11·1 answer
  • How come I haven't moved to the next rank even though I have all of the right things to move on?
    10·2 answers
  • Modify an array's elements Write a for loop that iterates from 1 to numberSamples to double any element's value in dataSamples t
    11·1 answer
  • Sean works for a company that ships hospital equipment. He needs to calculate the weight of the items being shipped. He enters t
    12·1 answer
  • Enhancement of job satisfaction and productivity are key characteristics of which theoretical perspective of work design? ​
    6·1 answer
  • Is anybody willing to gift me V bucks? Gamer tag: SpiffyPlop
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!