1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svp [43]
3 years ago
12

What are the 5 major components of computer.Give example of each​

Computers and Technology
1 answer:
notsponge [240]3 years ago
8 0
1-Input unit
2-output unit
3-storage
4-central processing unit
5-arithmetic and logic unit
You might be interested in
What field in an IPv4 packet is altered to prioritize video streaming traffic over web surfing traffic?
Serhud [2]

Answer:

DiffServ (Differentiated Service)

Explanation:

DiffServ (Differentiated Service) field is used to prioritize traffic in IPv4 packet.

DiffServ is used as QoS (quality of service) on networks at Layer 3, replacing former IPv4 TOS field to effectively deal with the web traffic and prioritization issues starting from 1998.

3 0
4 years ago
How can you encrypt and decrypt a message in cryptography
ser-zykov [4K]
There are two main types of encryption - <span>symmetric and asymmetric. 

Using symmetric encryption, you use a single secret key that is used to both encrypt and decrypt the data. This form of encryption has been used way before computers! Without this key it is very hard to decrypt a message. However, the issue with this is that if you want to send an encrypted message, you also have to send a key to them, and </span>if your somebody unintended intercepts the key, they can read the message.

What's the solution? Asymmetric cryptography or public key encryption. Asymmetric cryptography uses encryption that splits the key into two smaller keys. One of the keys is public and one is kept private. A good metaphor for understanding this is the public key is the lock, and the private key is the key. You can encrypt a message to send to somebody with their public key, locking it, which they can then decrypt, unlock, with their private key. And vice versa. So with this kind of encryption it's very difficult to decrypt a message for anybody but the owner as it's much harder to steal when it doesn't need to leave their computer, but easy to encrypt messages to send to them

5 0
3 years ago
Where do you see script fonts? Where do you see Display or Ornamental fonts?
STatiana [176]

Answer:

Script typefaces are based upon the varied and often fluid stroke created by handwriting. They are generally used for display or trade printing, rather than for extended body text in the Latin alphabet. Some Greek alphabet typefaces, especially historically, have been a closer simulation of handwriting.

Explanation:

4 0
3 years ago
Write a program that gets five integer test scores from the user, calculates their average, and prints it on the screen. Test yo
Alex

Answer:

total = 0

for i in range(5):

   score = int(input("Enter a score: "))

   total += score

average = total / 5

print("The average is " + str(average))

Explanation:

*The code is in Python.

Initialize the total as 0

Create a for loop that iterates five times. Inside the loop, ask the user to enter a score. Add the score to the total (cumulative sum)

After the loop, calculate the average, divide the total by 5

Print the average

5 0
3 years ago
Compare the current in two lightbulbs wired in a series circuit
julia-pushkina [17]
<span>The current flow in two light bulbs wired in a series circuit is identica</span>
7 0
3 years ago
Other questions:
  • Reputable firms often ask recent graduates to pay an up-front fee for a job.
    10·2 answers
  • When you close a file, what happens to the undo history list for that file?
    5·1 answer
  • Turn-outs are features of roadways that are to be employed by
    10·1 answer
  • Which option describes the purpose of configuring native supplicant profile on the cisco ise?
    7·1 answer
  • As text is typed in the _____ text box, a drop-down list displays options for completing the action, displaying information on t
    11·1 answer
  • A computer program uses 3 bits to represent integers. When the program adds the decimal (base 10) numbers 5 and 3, the result is
    6·1 answer
  • A ______ object is used for displaying the results of a question based on stored data.
    11·2 answers
  • When should you stop where you are, drop to the
    11·1 answer
  • The temperature at 8 AM was 44°F and at noon it was 64°F. what was the percent of change from 8 AM to noon?
    11·1 answer
  • What do you do when you have computer problems? Check all that apply.
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!