1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Keith_Richards [23]
3 years ago
11

All the processing-of work-done on a computer is performed by the what?

Computers and Technology
1 answer:
Nat2105 [25]3 years ago
6 0
It's computed by the processor
You might be interested in
What must be true before a motherboard can take advantage of the triple memory channels on the board?
sergeinik [125]

Answer:

The motherboard must be configured to accept a particular type of memory.

Explanation:

The motherboard must be configured to accept a particular type of memory, especially when dealing with multi-channel memory. On motherboard, different modes can be configured to run simultaneously . For motherboard to take advantage of  the triple memory channels on the board. You can also check the manual that came with the motherboard to know how to configure it.

7 0
2 years ago
A typical broadcast live events and use streaming technology in which audio and video files are continuously downloaded to your
Nikitich [7]

Answer:

Webcasts

Explanation:

The rest of the options don't need to be streamed as there isn't a continuous flow of information.

7 0
3 years ago
Given the number of rows and the number of columns, write nested loops to print a rectangle. (PYTHON)
Allushta [10]

Answer:

Explanation:

Please see the attached picture for help.

6 0
3 years ago
Read 2 more answers
Focusing on a target market makes it harder to develop products and services that specific groups of customers want.
Sloan [31]

Answer:

ikr so true

Explanation:

5 0
2 years ago
A stealth network attack in which an unauthorized person gains access to a network and remains undetected for a long time is ref
polet [3.4K]

Answer:

"Advanced persistent threat " is the right one.

Explanation:

  • APT seems to be a clandestine cyber assault on something like a network connection where another assailant achieves and retains unauthorized knowledge to the communication network, however impossible to conceive for a considerable period.
  • They represent compound channel assaults that use different components including various approaches of attack.
6 0
2 years ago
Other questions:
  • Your personality is that of everyone else
    15·2 answers
  • Drag the tiles to the correct boxes to complete the pairs.
    6·1 answer
  • WILL GIVE BRAINLIEST
    15·1 answer
  • Plz tell the answer I I'll mark u as the brainliest
    14·1 answer
  • Which of the following is NOT a type of insurance fraud?
    14·2 answers
  • WHAT TYPES OF ACTIVITIES ARE PERFORMED BY HEALTH CARE SOFTWARES
    8·1 answer
  • What is the output of the following code:
    10·1 answer
  • Difine the term pigment​
    14·3 answers
  • given 2,4,3,-1 as input, what is the output for the following program:total_product = 1 user_value = int(input()) while user_val
    13·1 answer
  • What two items must be passed in a tuple to the socket module's connect method in order to connect a socket? (choose two.)
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!