1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitriy789 [7]
4 years ago
7

.Pretend you are ready to buy a new computer for personal use.First, take a look at ads from various magazines and newspapers an

d list terms you don’t quite understand. Look up these terms and give a brief written explanation. Decide what factors are important in your decision as to which computer to buy and list them. After you select the system you would like to buy, identify which terms refer to hardware and which refer to software.
Computers and Technology
1 answer:
andriy [413]4 years ago
7 0

Answer:

Brainly is not meant to give paragraph answers to large questions.

In a computer (desktop)

There are 8-9 main components to a PC

Motherboard

CPU

GPU (for gamers)

RAM

SSD

HDD

PSU

Cooling fans (for AMD processors stock fans are included)

Case (some fans included)

I personally build my computers (desktops) as its cheaper and I won't have to pay a build fee.

You might be interested in
Disk quotas are set using the ____ console. diskpart disk management mst windows explorer
liraira [26]
<span>Answer: Disk Management Console</span>
8 0
4 years ago
To exclude members of a group from the basic permissions for a folder, which type of permission would you assign? Deny Allow Mod
oksano4ka [1.4K]

Answer:

Deny

Explanation:

Under the New Technology System, the Deny permission is applied when the administrator wants to overrule the permission given to members of a group. The Allow and Deny options help in regulating access to the components of the system. Only authorized groups are granted access to the files.

Most times, the Deny permission is considered before the Allow permission. If the user is denied access to some files and granted access to some, the deny permission is most times considered first.

4 0
3 years ago
List three types of cardinalities for relationships within a relational database.
Afina-wow [57]
This is about identifiers in a record referring to other records.
You can have many to one, one to one, many to many.

E.g., if you have two tables, Authors and Books, then a book record could have a reference to an author record. Since an author can write many books, this would be a many-to-one relationship.


3 0
3 years ago
Cuando fue creada la aplicación Adobe Photoshop (creada, no lanzada)
Cloud [144]

Answer:

en el año 1991

Explanation:

:)

4 0
3 years ago
Which term means a cryptography mechanism that hides secret communications within various forms of data?.
andrezito [222]

Answer:

anything u have daling

Explanation:

6 0
2 years ago
Other questions:
  • witch of the following is a good way to choose your location as you develop your study method? A. Going where most of your frien
    6·1 answer
  • What is the term used to describe data sets are so large and complex that they become difficult to process using traditional dat
    12·1 answer
  • How do you know if your phone has a virus?
    13·1 answer
  • Find products that satisfy BOTH conditions below:______
    6·1 answer
  • Which key should you press and hold to select multiple cells?
    8·2 answers
  • Hellpppp please I need it!
    15·1 answer
  • What is the difference between computer hardware and computer software?<br>​
    10·1 answer
  • It is important to consider design details when creating an api because: ______________
    14·1 answer
  • Why is quantum computing potentially a better fit for weather forecasting than classical computers?.
    8·1 answer
  • Are programs that understand physics and/or hardware embedded? for example, one that uses finite-element methods to predict flui
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!