1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svp [43]
3 years ago
12

What are the 5 major components of computer.Give example of each​

Computers and Technology
1 answer:
notsponge [240]3 years ago
8 0
1-Input unit
2-output unit
3-storage
4-central processing unit
5-arithmetic and logic unit
You might be interested in
Stages of reverse engineering
ivann1987 [24]

Answer:

Capture Data, Refine the Model, and then Manufacture it.

Explanation:

5 0
3 years ago
Pete would like to respond only to users within his organization with an automatic reply. He is configuring the automatic respon
Ahat [919]

Answer:

megan pete

Explanation:lol just  had to

4 0
3 years ago
Return to the Product Mix worksheet. Benicio wants to provide a visual way to compare the scenarios. Use the Scenario Manager as
finlep [7]

Answer:

To create a pivot table, select the columns to pivot and click on the insert option, click on the pivot table option and select the data columns for the pivot, verify the table range, select the location for the pivot and click ok. To format a column, select the columns and click the number option on the home tab, select the currency option and click on the number of decimal places

Explanation:

Microsoft Excel is a great tool for data analysis and visualization. It has several mathematical, engineering, statistical, and graphical tools for working with data.

A pivot-table is an essential tool for describing and comparing data of different types.

6 0
3 years ago
What does an Information security analysts do?
coldgirl [10]

Answer:

Information security analysts install software, such as firewalls, to protect computer networks. Information security analysts plan and carry out security measures to protect an organization's computer networks and systems. Their responsibilities are continually expanding as the number of cyberattacks increases.

Explanation:

hope this helps

4 0
3 years ago
1.   Which of the following is an example of a primary cost of an accident or injury?
adelina 88 [10]

1. A

2. D

3. D

4. C

5. Pretty sure it’s A, I could be wrong though

6. A

7. Not sure on this one

8. Either B or D

9. A

10. C

11. D

12. C

13. C

Hope this helps a little bit

7 0
3 years ago
Read 2 more answers
Other questions:
  • The a0 is the part of the central processing unit that performs arithmetic calculations for the computer.
    8·1 answer
  • Lionbridge theory test
    6·2 answers
  • What does the launcher button do? (From Microsoft Word 2016)
    6·1 answer
  • What characters cannot be used in a filename?
    15·1 answer
  • What is a written or electronic document that outlines etiquette policies for using networks and network resources?
    8·1 answer
  • Premise: Tracy has a file that contains a list of actors and the movies in which they acted. She wants to know the top 3 ranked
    8·1 answer
  • Searching for a particular record in a database is called “querying the data.”<br> True<br> False
    9·2 answers
  • Choose the best answer from the drop-down menu. A ______ allows multiple connections to a single signal. Without a ______, conne
    7·2 answers
  • Some programmers include scroll bars, title bars, buttons, and menus in a program simply by adding them to a layout through a pr
    10·1 answer
  • Write a program that: Takes the list lotsOfNumbers and uses a loop to find the sum of all of the odd numbers in the list (hint:
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!