1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AleksAgata [21]
3 years ago
12

Will give Brainiest and stuff to right answer[s].

Computers and Technology
2 answers:
Aneli [31]3 years ago
6 0
#22 is 1s and 0s, hope that helps a little bit
kirill115 [55]3 years ago
6 0

I can help with most of these!

#1: Explain the use of logic gates.

Answer: Logic gates are comparisons to operations that are performed in the CPU using keywords such as, OR, XOR, NOT, AND, NAND, XNOR, and NOR.

#2: ____ refers to logic in programming and errors in program code.

Answer: BUGS refers to logic in programming and errors in program code.

#3: What type of software resides on a computer’s hard drive, and controls the CPU and all other activity between components?

Answer: The operating system!

#4: Why are high-level languages easier for humans to understand?

Answer: They are written with human-friendly words that humans understand.

#5:  Which component receives data and loads it into memory for use?

Answer: The CU!

#6: Explain why a CPU’s speed is affected by the number of buses.

Answer: Each bus is basically a highway on the motherboard that is enabling data transfers from and to the CPU. So, since there are numerous buses, large amounts of data are being transferred. This is how the CPU's speed is affected.

#7: What's the keyword for a field that stores a true/false value?

Answer: Boolean

#9: How is Windows 8 different from an Internet browser such as Firefox?

Answer: Windows 8 is system software; Firefox is application software.

#10:  Which computer programming language would be most easy to understand if you have never seen it before? Choose the best answer.

Answer: Javascript language!

#11: Which part of the CPU provides access to the external cache unit and other CPUs on the motherboard?

Answer: The southbridge!

#14: What is a user-friendly software program that displays information to the user, accepts input from the user, and provides output for the user?

Answer: Human-computer interface!

#15:  What is a group of printable characters enclosed within double quotation marks called?

Answer: String Literal!

#16: Which component comprises the central processing unit?

Answer: The Control unit!

#17: What typically handles communications among the CPU, in some cases RAM, PCI Express (or AGP) video cards, and the southbrige?

Answer: The northbridge!

#18: Explain why clock speed is used to measure a computer’s speed in calculation and processing data.

Answer: Clock speed is the measurement of how many cycles a CPU can process. When the processor speed or CPU is compared to different computers, the higher the clock speed is, the more efficient and faster the computer will run.

#19: Choose the following components that are controlled by the motherboard.

Answer: The CPU cooling fan, power supply and internal speaker are all controlled by the motherboard.

#21: When does the ALU get activated? Choose the most appropriate answer.

Answer: Once an instruction that involves a calculation comes to the CPU.

#22: Which of the following makes up binary code?

Answer: 1s and 0s!

You might be interested in
Answer the following questions for Web browser and Web server software: 1. What functions should this software application provi
timurjin [86]

Answer:

Explanation:

Functions should a software application provide to keep a web browser secured

1) The web browser should always be updated, so kindly keep the "automatic update" option enable on your browser settings so that whenever the browser gets an update, it will be updated automatically.

2) Always keep the third party cookies disabled because there are so many unauthorized and phishing sites over the internet they may lead the browser unsafe and cause very higher security risk so block all the third party sites and cookies from the browser

Functions should a software application prohibit to keep a web browser secured

1) Do not store passwords on your web browser, deny the "store password" option on your browser settings. Even if you store passwords on your web browser do set a very strong master password to access all the stored passwords.

2) Do not click on unwanted, unknown hyperlinks. There will be many unsolicited attachments, PDFs, DOCs, files, etc over the internet so do not open or download it unnecessarily.

Functions should a software application provide to keep a web server secured

1) Always use an application scanner. Whenever you install or download any new applications do scan the application before accessing it.

2) Install all the security patches because there are more number of hackers over the internet so do not deny installing the security patcheds on time.  

Functions should a software application prohibit to keep a web server secured

1) When an application is not in use for long time, better uninstall it because they are actually of no use so do uninstall all the unwanted softwares or applications along with extensions.

2) There may be scripts, files, setups, codes stored on the web server unknowingly so do check it and delete all the sample scripts, files and codes from the web server.

5 0
3 years ago
A network administrator is configuring an ACL with the command access-list 10 permit 172.16.32.0 0.0.15.255. Which IPv4 address
lord [1]

Answer:

For this wild card mask 0.0.15.255 the ACE IP address will be 172.16.47.254

Explanation:

ACL is the access control list that is used to enlist the ip addresses that allowed or restricted to access the network. ACE is an IP address from the list ACL that has all rules and regulations related to access of network. The ACE could be in the range of IP address in ACL. ACL can be calculated with the help of initial IP address adding with wild card mask.

So

Initial IP address is = 172.16.32.0

Wild card mask =0.0.15.255

by adding above values we can find the last IP address of ACL.

after addition

Final IP address is = 172.16.47.255

The options that are available with question, Only option between the range is  172.16.47.254. So we can say that This is the only ACE IP address in options.

7 0
3 years ago
I will mark you as BRAINLIEST if you give me the correct answer of the questions... Pls asap with all details i am time limited
Alex_Xolod [135]

Answer:

11. 1million square decimetres (from online)

20. assuming room is rectangular,

length= (p - 2b)/2

because perimeter= 2 length + 2 breadth for rectangular

6 0
2 years ago
Read 2 more answers
An organization has a website with a guest book feature, where visitors to the web site can input their names and comments about
kozerog [31]

Answer:

B

Explanation:

6 0
3 years ago
Read 2 more answers
Blank are what make up the World Wide Web.
andreyandreev [35.5K]
Web pages make this up.
3 0
2 years ago
Other questions:
  • 50 points!!!!!
    9·2 answers
  • Write the following arithmetic expression as a valid C arithmetic expression: x = x + number
    9·1 answer
  • Describe how one can change row and height
    6·1 answer
  • What are the pros and cons of using ICT
    5·1 answer
  • What is episodic memory? knowledge about words, concepts, and language-based knowledge and facts information about events we hav
    10·1 answer
  • What are the possible consequences of intentional virus setting?
    14·1 answer
  • Quick!! Im taking a timed test so pls hurry!! Ill even mark as brainliets!!
    5·2 answers
  • Write a program to find all integer solutions to the equation 4x + 3y -9z = 5 for values of x, y, and z between 0 to 100.
    11·1 answer
  • How to add a legend to a graph in excel?
    7·2 answers
  • For her presentation on Italy, Matilda used a red background with light green text. When her friend critiqued her presentation,
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!