1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zysi [14]
3 years ago
12

The following parts were ordered by someone building a personal computer:

Computers and Technology
1 answer:
otez555 [7]3 years ago
4 0

The significance of the 550W in the 6th item (Zoltz 550W) is output power.

<u>Explanation:</u>

The unit that is essential to provide power for the working of computer refers to the power supply unit. This will take the electricity that is essential for the working of computer and this will be converted in Direct current. It is very helpful in regulating the fluctuations that may damage the computer.

They are usually determined based on the amount of watts they will be producing. When the computer has more power it requires more watts for the working of its parts. In the options given, the significance of the sixth item which is Zoltz 550W will be the output power.

You might be interested in
Given a sorted list of integers, output the middle integer. assume the number of integers is always odd.
Svetllana [295]

integer userInput

integer i

integer mid

integer array(20) number

userInput = 1

for i = 0; userInput >= 0; i = i + 1

  if number[i] > -1

     userInput = Get next input

     number[i] = userInput

i = i - 1

mid = i / 2

if i > 9

  Put "Too many inputs" to output

elseif i % 2 == 0

  Put number[mid - 1] to output

else

  Put number[mid] to output

4 0
2 years ago
Write a program that ask a user to input radius of a circle and display circumference of a circle
uranmaximum [27]

Answer:

Explanation:

8

4 0
3 years ago
When saving my template, I will need to select Word Template in the _____ dialog box.
Bond [772]
You will need to select the file type to be saved as a template in the save as dialog box 
4 0
3 years ago
Which of the following is a sample IPv4 address?
const2013 [10]

Answer:

The first one, 99.14.242.51 is the only valid IPv4 address listed.

Explanation:

An IPv4 address is formatted as four eight-bit numbers separated by decimals. This means that a valid one will have four numbers from 0 to 255, with decimals in between.

The first one, 99.14.242.51 is a valid IPv4 address.

The second one has the number 342, which is greater than eight bits.

The third one has five octets.

The fourth one is in the wrong format altogether, using what appear to be 32-bit numbers

7 0
3 years ago
You are asked to assume the role of an employee of the DigiFirm Investigation Company. As part of its community outreach effort,
kirill [66]

Answer:

1.  To trace an email we need to examine the header part of the email. By examine the header of an email we could extract the sender, subject and other important credentials related to that email.  

2. The command to trace the email id is “whois” command.

 First open the email client and find the IP address of the received email that need to be traced.  The command “whois” IP address gives the registration information of that IP address.

 3.  Reverse address/email search is the procedure used by the experts to find the origin or the ownership of the email.  Rather than tools websites are more use full in the reverse address search.

http://reverse.addresssearch.com, www.iplocation.net, etc. are good to find the ownership of an email.

4. We need to set up mail server to send, receive and to explore various activities associated with an email.  The other related purpose servers like SMTP server, HTTP server , etc are also required to assist large organizations.  The mail server can be a stand-alone computer or a collection of computer and servers.

 5.  The executable files should be examined thoroughly in the server, it can be dangerous malwares.  The examination is mainly done by scanning for malicious words and sender address.  Since many mail providers does not allow executable files to send, so the attackers are using other files also as a carrier of the malwares, so now every emails should be subject to deep examination using some malware scanner.  

6.   By the time of examination the some of the legitimate mails may also come under the suspect list so further check is needed there.  At the same time the attacks can be from legitimate sources also this could be go un-noticed; this should be also a challenge to face in the stage of e-mail examination.

8 0
3 years ago
Other questions:
  • In two or more complete sentences, summarize the difference between renewable and nonrenewable resources? Justify your responses
    13·2 answers
  • When should students practice netiquette in an online course? Check all that apply.
    14·2 answers
  • If a user copies the formula D15 into D16, what would the formula read in D16?
    15·2 answers
  • ​Which of the following styles sets the column breaks within paragraphs to leave a minimum of two and three lines at the top and
    11·1 answer
  • (true/false) In a layered operating system design, requests (such user processes may need to interact with multiple layers, resu
    14·1 answer
  • Can someone pls help me my notifications aren’t working, I need help ASAP ty!
    5·1 answer
  • Write the name of the tab, command group, and icon that is used to create multilevel lists.
    12·1 answer
  • How to make classs constructer java.
    14·1 answer
  • Keith would like to compare data he has collected from research. The data includes the electrical output
    13·1 answer
  • what motivators should the action section of your sales message include? check all that apply. a satisfaction guarantee a proof
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!