1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BigorU [14]
4 years ago
9

Help what is a computer made from (computer class question)!!

Computers and Technology
1 answer:
Genrish500 [490]4 years ago
8 0

You need a CPU (central processing unit), which is the so-called brain of the computer. It processes instructions given to it by software, such as your word processing or accounting programs. A computer also needs a place to store data. That's usually a magnetic hard drive.

<u><em>A CPU </em></u>

<u><em> </em></u>

<u><em>A Motherboard </em></u>

<u><em> </em></u>

<u><em>RAM </em></u>

<u><em> </em></u>

<u><em>A Storage device </em></u>

<u><em> </em></u>

<u><em>And a Power Supply </em></u>

<u><em> </em></u>

<u><em>If you're referring to the elements? </em></u>

<u><em> </em></u>

<u><em>Silicon, Gold, Silver, Copper, Aluminum(ium) Germanium, and perhaps various other elements.</em></u>

You might be interested in
In Microsoft Word, spelling errors are identified by a _____.
kvasek [131]
Red underline. Hope this helps.
5 0
3 years ago
Read 2 more answers
What type of network access control uses Active Directory to scan a device to verify that it is in compliance?
Komok [63]

Answer:

Agentless NAC

Explanation:

An active directory is a kind of storage service that holds data of objects like user credentials, resource location etc, for permission and network access authentication.

Network access control is a form of computer network security that integrates security technology like antivirus, intrusion detection and prevention systems etc to system authorisation and authentication processes to control access to a network.

An agentless network access control uses the active directory to scan devices to confirm its compliance to security policies.

3 0
3 years ago
In which area of the screen can features and functions of Word be accessed?
abruzzese [7]

Answer:

Toolbar

Explanation:

j don't know if you meant that instead of scroll bar, but tool bar is the answer

5 0
3 years ago
E-governance is the only solution against corruption. justify the statement in context of nepal​
notka56 [123]

Answer:

Following are the solution to this question:

Explanation:

The E-government implies use as part of the government systems to offer SMART, which is used to manage smart governance, ethics or accountability, sensitivity, and transparency. It is the research teams, that also shown that policies were progressing in India's creation of information technology. It is also argued against reducing the risk of bribery through improved public official surveillance and reducing its need for citizen engagement with porters with key services.

6 0
3 years ago
A company is executing a strategy to encrypt and sign all proprietary data in transit. The company recently deployed PKI service
Softa [21]

Answer:

A. S/MIME

B. TLS

C. Kerberos

Explanation:

PKI : Public Key Infrastructure is a technique which will allow services or applications to communicate securely across the unsecured network or internet.

PKI mainly consist of CA or Certificate Authority who can issue digital certificates or they are also known as trusted CA.  exmaples are godaddy, digicert, verizone, symmantec, etc.. and RA also known as Registration Authorities and they verify if the requested certificates can be stored at CA. Keys will be stored in the central directory.It will also consists of certificate management system and the policies governing PKI.

S/MIME : Secure/Multipurpose Internet Mail Extensions which use assymentric cryptography and sign the MIME data.   S/MIME will provide services like  Authentication, Encryption , Integrity, Privacy and Non repudiation for messaging applications

SMIME uses certificates which can be self signed or CA certified. It specifies MIME type as  application/pkcs7-mime  while transmitting the data.

TLS : Transport Layer Security. the earlier versions used to be known as SSL ( Secure Socket Layer) SSLv3 got depreciated and TLSv1.2/1.3 are popularly used to provide encryption, authentication, Integrity and Hashing for client to server side communication.

Most of the applications communicate securely using TLS.  They will establish secure TCP connection using SSL Handshake. During the Handshake they will exchange supported versions, ciphersuites and certificates. Applications which uses TLS always uses CA certificates and Inhouse applications can communicate using self signed certificate or even with CA certificates.

HTTPS which is also known as HTTP over SSL is widely used for almost all the web services to communicate securely across the internet.

Kerberos : It is a protocol used to prove the identity for two nodes which are communicating with each other. Kerberos uses both symmetric key cryptography and assymetric key cryptography. However, symmetric key cryptography is used widely and public key cryptography is used optionally.

Authentication server which is also known as AS is used to authenticate the requesting client.  It further forwards the user credentials to key distribution center. KDC further issues to TGT ( ticket granting ticket) and it uses TGS's secret key to encrypt. User will receive a encrypted output.  

When a User Login then The client authenticates itself to the Authentication Server (AS) which forwards the username to a key distribution center (KDC). The KDC issues a ticket-granting ticket (TGT), which is time stamped and encrypts it using the ticket-granting service's (TGS) secret key and returns the encrypted result to the user's workstation. Sessions will be renewed and managed by users session manager.

4 0
3 years ago
Other questions:
  • Why ois my printer not printing pictjures?
    9·1 answer
  • Write two statements to read in values for birthMonth followed by birthYear, separated by a space. Write a statement to print th
    12·1 answer
  • Explain how to identify a starting position on a line.
    15·2 answers
  • What is the rarest Supercar/hypercar you have ever seen?
    7·1 answer
  • Which of the following events would most likely produce an earthquake
    10·1 answer
  • What is the correct order of headers, from left to right, in a completed frame?
    8·1 answer
  • Search engines enable you to
    12·1 answer
  • According to chronology, arrange the steps that you need to take during the installation of a ram stick?
    13·1 answer
  • What is wrong with the following code?
    11·1 answer
  • Tyra is peer conferencing about her project with a friend. Tyra's friend provided feedback that Tyra does not agree with. What s
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!