1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olya-2409 [2.1K]
3 years ago
13

Where is most of the information processed in a computer

Computers and Technology
1 answer:
serg [7]3 years ago
6 0

Answer:

CPU is the correct suitable one-word answer for the above question.

Explanation:

CPU stands central processing units which are the only responsible device for the processing of the instruction given by the user for the demand of some output. CPU is divided into two parts- Arithmetic logic unit and control unit. On which Arithmetic logic unit is responsible for the processing of Arithmetic and logical operation and the control unit is have to control all the operation.

In a computer system there are five main components --

  1. Monitor
  2. CPU
  3. keyboard
  4. mouse
  5. Memory

On which except CPU and Memory, all are the part of the input and output device. Memory and CPU are wrapped in one box known as the Processor device in which memory has to store the data and CPU has to process the data.

You might be interested in
The Spell Checker can be found in which two locations in most word processing software?
raketka [301]
The answer is D./Under File or Under Edit
8 0
4 years ago
Which of the following is not a standard method called aspart of the JSP life cycle*
Kazeer [188]

Answer:

*jspService()

Explanation:

These are the steps in JSP life cycle.

1. Conversion JSP page to Servlet .

2.Compilation of JSP page(test.java)

3.Class is loaded (test.java to test.class)

4.Instantiation (Object is created)

5.Initialization (jspInit() method is only called once at the time of servlet     generation )

6.Request processing(_jspService() method is used for serving requests by JSP)

7.JSP Cleanup (jspDestroy() method is used for removing JSP from use)

There is no *jspService() method in the JSP life cycle.

8 0
4 years ago
What value will the variable x have when the loop executes for the first time?
tia_tia [17]

The value that x will return when it runs the above loop for the first time is Tom. It is to be noted that the above code is JavaScript.

<h3>What is a JavaScript?</h3>

JavaScript is an object-oriented computer programming language that is used for the creation of effects that are interactive.

Scripts that are written using Java Programming Language can be used to control multimedia, create animated images, control how websites behave etc.

Java is also used in the creation of Games and many more.

Learn more about JavaScript at:
brainly.com/question/16698901

6 0
2 years ago
In most signal "timing diagrams" (like the one below) the signals do not change from low to high, or from high to low, abruptly.
melisa1 [442]

Explanation:

This transient state occurs due to the fact that the signal change from low to high and high to low doesn't occur intermediately but in a very small time, in relation to the signal time itself.

At transistor level there are parasitic (undesired) capacitances and resistances, formed due to the layout configuration of conductor and dielectrics. As consequence a RC circuit is formed, thus making a propagation delay.

This delay must be characterized for each circuit, and specified as tpHL (transition time from High to Low) and tpLH (transition time from Low to High)

8 0
3 years ago
What type of security solution provides a hardware platform for the storage and management of encryption keys?
shutvik [7]

The type of security solution provides a hardware platform for the storage and management of encryption keys exists hardware security modules .

Hardware security modules (HSMs) supply an effective method to control encryption keys.

<h3>What are Hardware security modules?</h3>

A hardware security module (HSM) exists as a physical machine that supplies extra security for sensitive data. This kind of device exists utilized to require cryptographic keys for essential functions such as encryption, decryption, and authentication for the usage of applications, identities, and databases.

The hardware usually costs at least USD 20,000 to deploy, USD 40,000 for increased accessibility, and multiple periods better for normal enterprise deployment.

Hardware Security Modules (HSMs) exist in hardened, tamper-resistant hardware appliances that strengthen encryption techniques by developing keys, encrypting and decrypting data, and designing and demonstrating digital signatures.

A Hardware Security Module (HSM) exists as a hardware-based protection appliance that develops, stores, and protects cryptographic keys. Sterling Secure Proxy utilizes keys and certificates stored in its store or on an HSM.

To learn more about Hardware Security Module refer to:

brainly.com/question/24118720

#SPJ4

7 0
2 years ago
Other questions:
  • PC’s &amp; More has shifted to sales and service of laptops and PCs, where it has the potential to triple the number of its cust
    14·1 answer
  • If you like to spend time outdoors working with plants and animals, you have a(n) _____. a. bodily/kinesthetic learning style b.
    6·2 answers
  • Ben works at a top accounting firm in Salt Lake City and his responsibilities include developing individual and departmental goa
    9·1 answer
  • For the following code, how many times would the for loop execute? String str = ("Ben and Jerry's ice cream is great."); String[
    7·1 answer
  • The process of _____ determines what volume a system can handle by comparing its performance to standards in the industry.
    7·1 answer
  • Write a program that will ask the user to input a phrase (multiple word sentence), and an integer value. A static function will
    14·1 answer
  • Which features of words are used to separate numbers and texts into columns
    11·1 answer
  • What type of program installs and gathers personal information, including password and account information, from a computer with
    9·1 answer
  • Keyword stuffing is considered to be a black hat technique for SEO and is highly suggested today by Google.
    6·1 answer
  • Write a for loop to print all the even numbers from 200 to 300.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!