1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
belka [17]
4 years ago
6

In today's computers, the CPU tells _______________ the clock speed it needs, and the clock chip then automatically adjusts for

the CPU.
Computers and Technology
1 answer:
Molodets [167]4 years ago
3 0

Answer:

the motherboard

Explanation:

The Motherboard, also called motherboard and motherboard, is a board that contains a printed circuit and to which all the components that make up a computer are connected. Among that series of integrated circuits that it has installed is the chipset, which is the connection center between the computer, RAM, expansion buses and other devices.

On the other hand, the motherboard includes software that is popularly known as BIOS and that allows to carry out the basic functions, such as: device tests, keyboard operation, video, operating system load and device recognition.

Then, the typical components of a motherboard are the following: one or more power connectors, the CPU socket, the RAM slots and the chipset.

You might be interested in
Write Java code that creates an array of n integers myArray, by taking n integers from the user with duplications, and do the fo
skad [1K]

Answer:

this should be what you need

Explanation:

import java.util.*;

public class ABC{

 public static void main(String[] args) {

   int n;

   //create scanner object

   Scanner sc = new Scanner(System.in);

   //ask for size of array

   System.out.print("Enter the size of array (n): ");

   //read the input

   n = sc.nextInt();

   //create an array of n length

   int [] myArray = new int[n];

   //ask user for array elements

   System.out.printf("Enter %d integers: ", n);

   //read array elements

   for(int i =0 ;i <5; i++)

     myArray[i] = sc.nextInt();

   

   //print the elements if myArray

   System.out.print("1 - The values of myArray are: [");

   for(int i =0 ; i < n; i++){

     System.out.print(myArray[i]);

     if(i < n-1)

       System.out.print(", ");

   }

   System.out.print("]\n");

   //calculate mean and sum of myArray elements

   int sum = 0;

   double mean = 0;

   for(int i = 0; i < n; i++)

     sum += myArray[i];

   

   mean = (sum*1.0)/n;

   //print the sum and mean of myArray

   System.out.printf("2 - The sum is: %d. The mean is: %.1f\n", sum, mean);

     

   //create an arraylist

   ArrayList<Integer> myArrayList = new ArrayList<Integer>();

   //copy the value of myArray to an arraylist without duplicates

   for(int i = 0; i < n; i++){

     if(!myArrayList.contains(myArray[i]))

       myArrayList.add(myArray[i]);

   }

   sum = 0; mean = 0;

   //display the values of myArrayList

   System.out.print("3 - The values of myArrayList are: [");

   for(int i =0 ; i < myArrayList.size(); i++){

     System.out.print(myArrayList.get(i));

     if(i < myArrayList.size()-1)

       System.out.print(", ");

   }

   System.out.print("]\n");

   //calculate sum and mean of myArrayList elements

   for(int i = 0; i < myArrayList.size(); i++)

     sum += myArrayList.get(i);

   mean = (sum*1.0)/myArrayList.size();

   //print the sum and mean of myArrayList

   System.out.printf("4 - The sum is: %d. The mean is: %.2f\n", sum, mean);

 }

}

3 0
3 years ago
Different the need for external or secondary memory​
alexira [117]

Answer:

Secondary storage is needed to keep programs and data long term. Secondary storage is non-volatile , long-term storage. Without secondary storage all programs and data would be lost the moment the computer is switched off.

External storage enables users to store data separately from a computer's main or primary storage and memory at a relatively low cost. It increases storage capacity without having to open up a system.

4 0
3 years ago
Value or power of a network grows exponentially as a function of the number of network members. this is known as ________ law.
mel-nik [20]
Value or power of a network grows exponentially as a function of the number of network members. this is known as Metcalfe's law. According to this law <span>the value (the power) of a </span>telecommunications network<span> is </span>proportional to the square of the number of connected users of the system (network members). Metcalfe's Law <span>characterizes many of the </span>network effects<span> of communication technologies and networks such as the </span>Internet<span>, </span>social networking<span> and the </span>World Wide Web<span>.</span> 
6 0
3 years ago
Your company is implementing a wireless network and is concerned that someone from a competing company could stand outside the b
hoa [83]

Answer:

Option A i.e., AES is correct.

Explanation:

The user corporation is installing the wireless server and seems to be worried when anyone representing the rival corporation might stands outside that property as well as gather wireless information. He ensured that corporation which WPA2 is safe. However, AES creates WPA2 stronger than WPA.

  • Option B is incorrect according to the following scenario because it is the security mechanism used when component through the IEEE 802.11i WLAN standard.
  • Option C is incorrect according to the following scenario because it is the protocol initially developed for configure wireless clients to such a dial-in connection device.
  • Option D is also incorrect according to the following scenario because it is the terminal access control.
6 0
4 years ago
What finger is used to key letter c
kumpel [21]

Answer:

your pointer finger

sorry if this is wrong

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • In the 1960s, techniques were developed that allowed individuals to fool the phone system into providing free access to long dis
    14·1 answer
  • A coworker is concerned about the veracity of a claim because the sender of an email denies sending it. The coworker wants a way
    6·1 answer
  • How does a project manager evaluate the scope of a project?
    14·2 answers
  • What type of link is used to call this file shown below?
    5·1 answer
  • 15. A mechanism by which other modules, such as I/O and memory, may interrupt the normal sequencing of the processor is called (
    13·1 answer
  • what is the ability to carry out financial transactions using mobile devices such as tablets and phones?
    5·1 answer
  • Which of the following is NOT a goal of a Material Requirements Plans (MRP)?
    12·1 answer
  • Identify the problems that computer program bugs can cause. Check all that apply.
    9·2 answers
  • With what software tool can you see the applications that are currently runni
    13·1 answer
  • are there any hexadecimal digits that cannot be created using 4 bits? how many bits would you need to represent the hexadecimal
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!