1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuki888 [10]
3 years ago
6

What are the 3 main hardware components of a computer?

Computers and Technology
2 answers:
beks73 [17]3 years ago
6 0
A these are your main components

B is just stuff like mouses, monitors etc

C binary is not a main component

D cpu and processor are the same thing

So A is your answer
alexdok [17]3 years ago
5 0

Answer:

Definitely A

CPU, Memory and Motherboard!

Explanation:

You might be interested in
Elizabeth types in the following search terms: "Adoption AND cats AND NOT Persians." what results will her search provide?
bazaltina [42]

Answer

pages that reference adoption and cats but not Persians

Explanation

Search terms are the words or phrases that a user enters into a search engine. Also known as the search query. They are also referred to as keywords or  words, terms, and phrases that visitors use to find your site or when one wants to search something on the search engines. You just need to type into search box order to pull up list of results. there are different types of search like search queries where a user enters into a web search engine to satisfy his or her information needs, they are often plain text or hypertext with optional search directives. and the Navigational search queries  is a search query entered with the intent of finding a particular website, web-page or a certain phrase.

3 0
3 years ago
Read 2 more answers
Why is it more secure to require a user to press ctrl+alt+delete to log on rather than displaying the windows welcome screen?
Levart [38]
Let's say for example you have a toddler, or a pet. Let's say a cat. If the ctrl+alt+delete wasn't there. It would go straight to entering the password. Now let's say your child or pet likes to press the keys for a while. If they manage to press enter and enter the incorrect password. Eventually it will lock up your computer.
5 0
3 years ago
Which activity does not allow a person to perform any work while at the shop
polet [3.4K]

Is it apprenticeship???:D

5 0
3 years ago
If person A creates an image with a creative common license. Person B then uses the image on his website. Who own the image and
Rudik [331]
Person A, of course. This person is the original maker of the image therefore that person has the rights to that image, person B does not automatically become the owner just by using it on his website. So the answer is person A.
3 0
3 years ago
Write a program that reads an integer, a list of words, and a character. The integer signifies how many words are in the list. T
kompoz [17]

Answer:

I can't read that pls reformat, or take picture.

Explanation:

3 0
3 years ago
Other questions:
  • ________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities. black-hat gray-ha
    10·1 answer
  • An individual is first with the network before they are authorized to access resources on the network A. countermeasure B. vulne
    11·1 answer
  • A database interrogation is a major benefit of the database management approach, where end users can query (“ask”) the database
    6·1 answer
  • Describe an application where a parallel circuit might work better than a series circuit.
    15·1 answer
  • If you implement a Wireless LAN (WLAN) to support connectivity for laptops in the Workstation Domain, which domain does WLAN fal
    5·1 answer
  • Fill in the correct formula called a contains numbers from Rhodes 1 to 20 you can use the formula blank to find the volume of th
    14·1 answer
  • Assume that ip has been declared to be a pointer to int and that result has been declared to be an array of 100 elements . Assum
    9·1 answer
  • Write the definition of a function named fscopy. This function can be safely passed two fstream objects, one opened for reading,
    11·1 answer
  • If you entered data into row 4 and it should be in row 3, you should _____.
    8·2 answers
  • Technical term of stealing personal information in social media.​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!