1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nataliya [291]
3 years ago
13

__________ is the brain of a computer. A. Hardware B. CPU C. Memory D. Disk

Computers and Technology
2 answers:
iren [92.7K]3 years ago
8 0

Answer:

The CPU is the brain of a computer

Anastaziya [24]3 years ago
6 0

The CPU is the brain of the computer. Hope it helps (:

You might be interested in
Checking authentication, checking authorization and access control, auditing systems, and verifying firewalls and other filters
nadezda [96]

Answer: Logical security list

Explanation:Logical security list that is used for checking of the authentication and authorization for the organizations. It consist the safeguarding the software, security access of password and other keys, system auditing, stages of the security etc.

These factors helps in the maintaining the level of the security and only authorized access to place in the system of a particular organization.Other options are incorrect because physical security system consist of the guards , locks etc physical devices, response plane is the feedback strategy and whiltelist is related with the acceptable people.

3 0
4 years ago
Which term is used for a formal, documented process that describes when and how official project documents may be modified, the
kondor19780726 [428]

Answer:

The term is Change control system

Explanation:

Change control system is a systematic approach or important part of project management process used to implement and serves vital purposes of assuring that the process of making changes is done carefully and ultimately signed off on by a responsible party. It enables essential control of IT activities in project management and coordination.

4 0
3 years ago
Read 2 more answers
Now for our sponsor Raid:Shadow legends
Xelga [282]

Answer:

Cool?

Explanation:

3 0
3 years ago
Read 2 more answers
Why is it difficult to correctly identify a new product as emerging technology
Gekata [30.6K]
Because a lot of people post false information on websites and marketing managers (whatever they're called) will actually falsely advertise their product as using new technology.
5 0
4 years ago
10 computer and operating systems errors​
babunello [35]

Answer:

what is

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • To add text to a slide when using presentation software, you need to add a text box. To add a text box, click the Text Box butto
    6·2 answers
  • You can use this effect to break a color into a percentage of its full strength.
    13·1 answer
  • With what information should you provide your support technician if you encounter an error message? the error text and code the
    13·2 answers
  • cellPhoneBill(m,tx)Write the function cellPhoneBill()that takes two int m and txas input and returns a float.The function takes
    11·1 answer
  • An investment website can tell what devices are used to access the site. The site managers wonder whether they should enhance th
    10·1 answer
  • When a chart is selected, numerous customization options can be found on which Chart Tools tabs?
    11·2 answers
  • Use______ to format cells when they meet a certain criteria.
    13·1 answer
  • By what other name can the folders in Windows 7 be called?
    5·1 answer
  • As a network architecture, you are tasked with designing a network for a six-story
    11·1 answer
  • The ____ line for any e-mail messages you write should clearly state the intention of the e-mail..
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!