1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AleksAgata [21]
3 years ago
12

Will give Brainiest and stuff to right answer[s].

Computers and Technology
2 answers:
Aneli [31]3 years ago
6 0
#22 is 1s and 0s, hope that helps a little bit
kirill115 [55]3 years ago
6 0

I can help with most of these!

#1: Explain the use of logic gates.

Answer: Logic gates are comparisons to operations that are performed in the CPU using keywords such as, OR, XOR, NOT, AND, NAND, XNOR, and NOR.

#2: ____ refers to logic in programming and errors in program code.

Answer: BUGS refers to logic in programming and errors in program code.

#3: What type of software resides on a computer’s hard drive, and controls the CPU and all other activity between components?

Answer: The operating system!

#4: Why are high-level languages easier for humans to understand?

Answer: They are written with human-friendly words that humans understand.

#5:  Which component receives data and loads it into memory for use?

Answer: The CU!

#6: Explain why a CPU’s speed is affected by the number of buses.

Answer: Each bus is basically a highway on the motherboard that is enabling data transfers from and to the CPU. So, since there are numerous buses, large amounts of data are being transferred. This is how the CPU's speed is affected.

#7: What's the keyword for a field that stores a true/false value?

Answer: Boolean

#9: How is Windows 8 different from an Internet browser such as Firefox?

Answer: Windows 8 is system software; Firefox is application software.

#10:  Which computer programming language would be most easy to understand if you have never seen it before? Choose the best answer.

Answer: Javascript language!

#11: Which part of the CPU provides access to the external cache unit and other CPUs on the motherboard?

Answer: The southbridge!

#14: What is a user-friendly software program that displays information to the user, accepts input from the user, and provides output for the user?

Answer: Human-computer interface!

#15:  What is a group of printable characters enclosed within double quotation marks called?

Answer: String Literal!

#16: Which component comprises the central processing unit?

Answer: The Control unit!

#17: What typically handles communications among the CPU, in some cases RAM, PCI Express (or AGP) video cards, and the southbrige?

Answer: The northbridge!

#18: Explain why clock speed is used to measure a computer’s speed in calculation and processing data.

Answer: Clock speed is the measurement of how many cycles a CPU can process. When the processor speed or CPU is compared to different computers, the higher the clock speed is, the more efficient and faster the computer will run.

#19: Choose the following components that are controlled by the motherboard.

Answer: The CPU cooling fan, power supply and internal speaker are all controlled by the motherboard.

#21: When does the ALU get activated? Choose the most appropriate answer.

Answer: Once an instruction that involves a calculation comes to the CPU.

#22: Which of the following makes up binary code?

Answer: 1s and 0s!

You might be interested in
En la historia del Computador porque se caracteriza la primera generación? *
Nadusha1986 [10]

D. Por el uso de tubos de vacio.

8 0
3 years ago
Keystroke loggers are stealth software packages that are used to monitor keyboard activities. Which is the best location to plac
irina [24]

Answer: Keyboard hardware & the operating system

Explanation:Keystroke loggers is also referred as the monitoring system which is a for the inspection of the every key pressed on an operating system. This technology monitors the activities of keypad devices such as smart phones etc. It is also used for the surveillance of the unauthorized activities that are done by the hackers or criminals.

Thus the correct option is keyboard hardware and the operating system is the location of the placement of the key loggers.

7 0
3 years ago
The _____ option will allow a user to remove text from one location and keep it for use later on the clipboard.
ValentinkaMS [17]

I believe the answer is the "cut" option?

8 0
3 years ago
In company a, there is a team that performs day-to-day it operations with a focus on security. they are responsible for a wide r
jasenka [17]

The security operation being carried out by this team is Administrative in nature.

<h3>What is the role of an Administrators?</h3>

An Administrators is known to be a person who works or handles the day-to-day deployment, operation and looking of an IT environment.

Note that their areas of concern are the systems, networks and applications as well as others and as such, The security operation being carried out by this team is Administrative in nature.

Learn more about  security operation from

brainly.com/question/371967

#SPJ1

6 0
2 years ago
Which things computer case contains
Ronch [10]

Inside the case are the components that make up the computer itself, such as the RAM memories, the processor and the hard disk, all of which are directly or indirectly connected to the motherboard. In addition, the case allocates the power suplly, which is responsible for supplying power to the computer.

<h3>What is a computer case?</h3>

The case is the hardware component used to house most parts of a computer. It is inside it that components such as CPU, motherboard, SSD, video card and power supply are placed.

In addition, it is where the outputs for connections to other equipment are found, such as USB and HDMI outputs, plug for sound box and microphone and input for memory card.

The case has the important function of protecting the internal components of a computer from knocks, heat, light, moisture and dust. That's because most of the electronic components inside a computer are very sensitive and need this protection.

It is also used to connect to other hardware components, such as a monitor, keyboard, mouse and headset, through the various outputs provided on its exterior.

See more about computing at: brainly.com/question/15707178

#SPJ1

5 0
1 year ago
Other questions:
  • What is the accounting equation?
    12·1 answer
  • Infrared, a wireless connection used in the past prior to bluetooth, was limited because it ________.
    10·1 answer
  • A(n) _____ might be written by a programmer or it might be created through a DBMS utility program.
    6·1 answer
  • The ____ aggregate function finds the largest value
    10·1 answer
  • You have the templates of 2 classes, Person and Program. The Person class has 4 attributes, name, age, major and gpa. There is a
    7·1 answer
  • The base 10 number 18 is equal to which base 16 number?<br><br> 10<br><br> 12<br><br> 14<br><br> 16
    11·1 answer
  • Declare a typedef struct named jumper_t that will have four parts: character array name that is 16 in length, double array of tr
    12·1 answer
  • ) Printers today have many features that include improved quality, photo printing capabilities, digital camera connectivity, bui
    11·1 answer
  • Kate saves her work on a secondary storage device that is fairly new, and uses flash technology instead of disks.
    10·1 answer
  • Enabling encryption of all data on a desktop or laptop computer is generally considered:______.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!