1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lesya [120]
2 years ago
9

I want to know all part of computer system?

Computers and Technology
2 answers:
Vesnalui [34]2 years ago
4 0
Parts of a Computer
Motherboard or MOBO: Where you will plug in most of your stuff
Central Processing unit or CPU:  Heart of your computer this will process everything
Random Access Memory or RAM: Quickly stores and receives information
CPU Cooler: Keeps your "Heart" (CPU) from overheating
Graphics card or Graphics Processing Unit (GPU): Produces/Provides an image (sometimes built into a motherboard)
Power supply or PSU: Powers your compenents similar to the big block that plugs into an Xbox
Storage (HHD or SSD): This will store all your files
Case: Holds everything together
xenn [34]2 years ago
3 0
Mouse keyboard tower printor monitor
You might be interested in
In case of a suspected data breach, what course of action should a chief information security officer (CISO) take
guapka [62]

Answer

1. Assemble his team

2. Find reason for breach

3. Evaluate what was lost

4. Ensure password change

Explanation:

In case of a suspected breach, the Chief information security officer should first of all assemble his incidence response team. This team should have representatives from all areas of the organization.

Then the reason for the breach and how access was gained has to be found out. An evaluation of what has been lost in the breach would be carried out and it's likely impact on the company.

In case credentials were stolen the CISO has to ensure that the employees change passwords. Also he has to notify all the necessary parties about the breach.

The CISO has to ensure that all employees are trained properly on security and they comply to security policies.

7 0
3 years ago
How do multi-cellular organisms develop?
FromTheMoon [43]
Letter B. is the answer
<span>B.  Cell differentiation - start from a single cell and as the cells divide they become specialized</span>

HOPE THIS HELPS















4 0
3 years ago
What are some ways tables can be inserted into a document check all reply
Natalka [10]
I dont know hdhehehehe
6 0
2 years ago
Read 2 more answers
How do i download my music from my computer to google play?
tresset_1 [31]
You can't do it to Google play. but you can connect to your computer and extract it and play it as a file
8 0
3 years ago
Assign a variable solve Equation with a function expression that has three parameters (x, y, and z) and returns the result of ev
tangare [24]

Answer: Following is a python code

def solveEquation(x,y,z):

   res=z-y+(2*x)  #stores expression's value

   return res

solveEquation(2,1,4)  #calls function

OUTPUT :

7

Explanation:

In the above code solveEquation is the function which takes three arguments x,y and z and their type is decided while calling the function and passing the values to these arguments. After the values are passed, an equation is written which is solved and the result is stored in variable res and then that variable's value is returned.

5 0
3 years ago
Other questions:
  • How does consumption of alcohol affect your driving skills? Name three ways that alcohol can affect your driving.
    15·2 answers
  • What will the following program display?
    15·1 answer
  • The file type blank identifies a word 2013 document
    12·1 answer
  • A student that earns a well qualified score on an ap exam would receive a ___
    13·1 answer
  • The area of a rectangle is the rectangle's length times its width.
    5·1 answer
  • Arrange the binary number in increasing order of their arithmetic output in the decimal number system ?
    9·1 answer
  • When all the system testing and bugs correction has done, the software product will be delivered to the user for __________.
    15·1 answer
  • Examples of pop in computer​
    14·1 answer
  • 3. Touch screens are both input and output devices. Describe one application where a touch screen is used as an output device. (
    7·2 answers
  • Chantal has configured the network at her company's new headquarters with a number of VLANs. All devices joined to the individua
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!