1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fenix001 [56]
3 years ago
5

Componets of computer

Computers and Technology
1 answer:
Temka [501]3 years ago
3 0

The four components of computer are explained clearly.

<u>Explanation:</u>

  • Hardware is the electrical physical parts that a computer system needs to function. It organizes all the process  by a circuit board that operates within a PC or laptop; built with the "motherboard", "graphics card", "CPU (Central Processing Unit)", "ventilation fans", "webcam", "power supply", and so on. Without hardware, there is no means of running the necessary software that makes computers so valuable.
  • Software is a program that facilitates a computer to execute a particular task, as objected to the hardware. Computer software has to be "stored" into the computer's storage (such as a hard drive, memory, or RAM). Working computer systems segment software into three major classes: system software, programming software, and application software.
  • A user is a person who handles a computer or network service. Users of computer and software output regularly require the technical expertise needed to fully know how they operate.
  • Data is defined as bases or figures, or knowledge that's saved in or utilized by a computer. This data will be in the form of text documents, images, audio clips, software programs, or other types of data. Computer data may be prepared by the CPU and are saved in files and folders on the hard disk.
You might be interested in
Sigma Technology is a company based in Singapore, with branches in 24 countries. It needs multiple CAs in different locations to
seropon [69]

PKI trust model that should be used, is a distributed trust model.

  • A distributed trust is a trust model that gives power to different source while taking the power away from a single source and thereafter, shares that responsibility to the wide range of sources. It is important as it allows trust to flows through network, marketplaces and forums.

  • With the use of this distributed trust model, Sigma Technology can have multiple CAs in different locations to work on behalf of the company. And even if one is absence, other CAs can still issue certificate without any hindrances.

Conclusively, we can say that PKI trust model that should be used is a distributed trust model.

Learn more from:

brainly.com/question/14837773

8 0
2 years ago
Floppy disks hold more data than a CD-R/RW.<br> true or false?
svp [43]
False the CD-Rw holds more
5 0
3 years ago
Read 2 more answers
Write a Bare Bones program that takes as input two variables X and Y. (Again, assume these values are set before your program be
Sauron [17]

Answer:

import java.util.Scanner;

public class num8 {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.println("Enter first number");

       int X = in.nextInt();

       System.out.println("Enter second number");

       int Y = in.nextInt();

       int Z;

       if(X <= Y){

           Z = 0;

       }

       else if(X >= Y){

           Z = 1;

       }

   }

}

Explanation:

  • The program is implemented in Java
  • In order to set the values for X and Y, The Scanner class is used to receive and store the values in the variables (Although the questions says you should assume these values are set)
  • The if conditional statement is used to assign values (either 0 or 1) to variable Z as required by the question.
5 0
2 years ago
Read 2 more answers
Do Violent Video Games Make People More violent in Real Life ?
vova2212 [387]
To be honest, NO. Its just a videogame but i see what you are saying...
4 0
3 years ago
Which algorithm makes the most efficient use ofmemory?
SashulF [63]

Answer:

Best-fit Algorithm

Explanation:

Best-fit: Allocating the smallest memory location that is greater than or equal to the size of process.

<u>Example</u>

Let these are the memory locations-210kb,310kb,260kb,610kb

                    and size of processes-160kb,450kb,250kb,300kb

For the first-fit,

We allocate 160 kb to the 210kb memory location

Then, we allocate 450 kb to the 610kb because others don't have the size.

Then,we allocate 250kb to the 310 kb.

300 kb will stop,as no memory locations can execute.

For the Best-fit,

We allocate 160 kb to the 210kb memory location

Then,we allocate 450kb to the 610kb.

Then,we allocate 250kb to the  260kb not 310kb according to best-fit.

Then we allocate 300kb to the 310kb.

For the worst fit,

We allocate 160 kb to the 610kb memory location according to the worst-fit algorithm.

Then,we can't allocate 450kb to any memory location.

Then,we allocate 250kb to the 310kb .

We can' allocate 300kb in 260kb memory location.

As we can see from this example that in First-fit algorithm 300kb process will stop as no memory location is there.

In worst-fit algorithm ,We can't allocate 450kb,300kb to any memory locations.

In Best-fit algorithm,we can allocate the process to each location,so this algorithm is using memory in a efficient way.    

5 0
3 years ago
Other questions:
  • The factorial of an integer N is the product of the integers between 1 and N, inclusive. Write a while loop that computes the fa
    10·1 answer
  • 2. What is the layout of the modern keyboard known as?
    13·1 answer
  • Turning up the transmit power or utilizing a high gain antenna to reach wireless users from a distance increases your exposure t
    12·1 answer
  • Issues with paper based records include a. time spent re-keying data, searching for paper copies, and filing. b. storage volume
    9·1 answer
  • _____________ describes the abstraction of web-based computers, resources, and services that system developers can utilize to im
    9·1 answer
  • An IP address in the form 197.169.100.1 is called a(n) ________. dotted quad encryption key random number sequential access numb
    7·1 answer
  • I have lost the watch (that,which) you gave me​
    12·1 answer
  • What Are the Benefits of Using Leads Automation Tool?
    5·1 answer
  • How scientist and technology beliefs society
    14·1 answer
  • Write a program that takes a string as an input. If the string entered is equal to
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!