1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anastasy [175]
2 years ago
7

List the seven basic internal components found in a computer tower

Computers and Technology
1 answer:
Softa [21]2 years ago
6 0
The basic internal components found in a computer tower also called as computer case are the following:

1. The motherboard
2. The power supply
3. Hard drives
4. Fan
5. Random Access Memory - RAM
6. CD - Rom's and DVD - Rom's
7. Ports and Hubs

These are found inside your PC case.

You might be interested in
According to the order of operation in Excel: a. Excel performs exponentiation, then multiplication, then division, then subtrac
Ilya [14]

Answer:

Option is b is correct answer. Excel performs exponentiation, then multiplication and division, then addition, and subtraction, it is correct order of operation in Excel. It is important to remember when you write any formula in Excel having different mathematical operators like +/ -/ ^/  etc, it follows a specific order and performs calculations in specific order which is termed as order of operator precedence. Each of mathematical operator has its precedence and executes in a special order set by Excel.

Explanation:

  • As we already know order of precedence of each mathematical operator is different in Excel. The order of operations for Excel is as follows:

  • Evaluate elements in parentheses.
  • Evaluate 'ranges' ().  
  • Evaluate 'intersections' (empty spaces).  
  • Evaluate 'unions' (,).
  • Perform negation (-).  
  • determine percentages (%).  
  • Perform exponentiation (^).  
  • Perform multiplication (*) and division (/), both are of equal precedence.  
  • Perform addition (+) and subtraction (-), both are of equal precedence.  
  • Evaluate text operators like (&).  
  • Perform comparisons like (=, <>, <=, >=).

 

Answer details  

Grade: Middle

Subject: Computers and Technology

Chapter: Order of precedence of mathematical operators

Keywords: precedence in Excel, operators precedence etc

7 0
3 years ago
3.1.2 Quiz: What Can Information Technology Do for You? Question 8 of 10 What is one reason why a business may want to move enti
balu736 [363]

Answer:

C. To focus on a global market

Explanation:

Information technology can be defined as a set of components or computer systems, which is used to collect, store, and process data, as well as dissemination of information, knowledge, and distribution of digital products.

An information technology interacts with its environment by receiving data in its raw forms and information in a usable format.

Generally, it is an integral part of human life because individuals, organizations, and institutions rely on information technology and systems in order to perform their duties, functions or tasks and to manage their operations effectively. For example, all organizations make use of information technology and systems for supply chain management, process financial accounts, manage their workforce, and as a marketing channels to reach their customers or potential customers.

Additionally, an information system or technology comprises of five (5) main components;

1. Hardware.

2. Software.

3. Database.

4. Human resources.

5. Telecommunications.

Hence, information technology or system relies on the data it receives from its environment, processes this data into formats that are usable by the end users.

One reason why a business may want to move entirely online is to focus on a global market through the use of social media platforms and networks to reach out to customers in various geographical location.

5 0
2 years ago
Identity theft, where people steal personal information, continues to be a problem for consumers and businesses. Assume that you
svetlana [45]

Answer:

Secure the personal information with complex multi-factor authentication and configure intrusion detection and prevention and a firewall.

Explanation:

Multi-factor authentication is a method of securing a client's personal information from the client's side to the data centre. It uses more than one security processes not policies. There key be three authentications process like a password, security token and biometrics or two authentications like password and biometrics or token.

The firewall and intrusion detection and prevention are vulnerability preventive method to detect and stop cyber attacks.

5 0
3 years ago
An array similar to a phone book has 1000 names arranged as names [0], names[1]....names[999]. Nancy wants to search a name X in
sammy [17]

Answer:

b. The names in the list should be in alphabetical order.

Explanation:

A binary search is an algorithm used for searching for an item in a list or array. The algorithm first sorts the data structure into order and then divides it into halves. If the searched item is less than the middle item in the list, then the algorithm searches for the target in the first half, else, in the second half. This reduces the time complexity of the search.

5 0
2 years ago
((Excel)) please help, 100 points, and brain crown thingy, not only that, i will make several of these so you can get several hu
cupoosta [38]

Answer:

First you read the question and numbers, then you use the numbers in the correct way and you try reallllyyy hard, you will find your answer! Hope this helps! :D

4 0
2 years ago
Other questions:
  • You are reviewing the style sheet code written by a colleague and notice several rules that are enclosed between the /* and */ c
    12·1 answer
  • What is the output of the second println statement in the main method? public class Foo { int i; static int s; public static voi
    14·1 answer
  • Which are among the ways you can use bitlocker encryption? (choose all that apply?
    5·1 answer
  • The ____ class act as a switchboard between the view layer and the domain layer.
    14·1 answer
  • Write a C++ program that would take 10 integers and outputs mean, median, and range. Create at least three functions: one for so
    7·1 answer
  • What is the biggest challenge for most business when going online?
    12·1 answer
  • Advantages of Linux include_____.
    6·1 answer
  • One key feature of malware is that it:
    13·1 answer
  • Explain the three schemes via which the binding of instructions and data to memory addresses can be done. In each scheme, how th
    13·1 answer
  • What are the two compatibility issues that may arise between computer systems while transferring presentations? different video
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!