1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ket [755]
4 years ago
10

_____ is used to temporarily hold small units of program instructions and data immediately before, during, and after execution b

y the central processing unit (CPU).
Computers and Technology
1 answer:
Mazyrski [523]4 years ago
8 0

Answer: A register

Explanation:

Registers are small memory used to store data or values and supply them to the processor as and when needed. These register hold the data temporarily and hold small units of program instructions. So whenever the CPU wants to work on data they have to be made available through the registers. Even after a arithmetic operation the registers serve as buckets for holding the value.

There are different types of registers such as register A, B, C etc and these registers lie in close proximity to the CPU so that we could provide the data immediately and much faster when asked by the CPU.

Therefore we can say that registers are used to temporarily hold small units of program instructions and data immediately before, during, and after execution by the central processing unit (CPU).

You might be interested in
What is important for an internet user to know about https:// ?
frutty [35]

Answer:

c. It should be contained in the website URL if you'll be providing any personal information.

Explanation:

Https in the URL ensures that the communication between the browser and the server is encrypted using SSL(Secure Socket Layer).

Https stands for Hyper Text Transfer Protocol Secure .

So in all those interactions where security of information flow is a major concern, the communication should happen over https. Examples include:

  • Financial transaction online from my bank account
  • Online purchase using credit card
  • Sharing sensitive information such as health records.

6 0
3 years ago
ABC Manufacturing Company is located in Hiroshima, Japan. Being prone to earthquakes, the company decided to implement a backup
maxonik [38]

The command interface protocol that I would suggest to the IT administrator is Secure Shell (SSH).

<h3>What is a command interface protocol?</h3>

A command interface protocol can be defined as a standard protocol that is designed and developed to processes commands in the form of lines of text to a software program that is installed on a computer system.

<h3>The types of command interface protocol.</h3>

In Computer technology, there are different types of command interface protocol and these include:

  • SSL
  • TLS
  • SSH

SSH is an acronym for Secure Shell and it is a standard network protocol that gives a IT administrator a secure way to access data over an unsecured network, especially when backing up data.

Read more on SSH here: brainly.com/question/17147683

7 0
2 years ago
If you want to implement fault-tolerance on your network, what type of raid would you use on the drives that contain the os and
antoniya [11.8K]

Answer: RAID 1

Explanation:RAID 1 is the type of raid that gets invoked by the help of two disks and also keeps the record that the disk does not fail. It works by duplicating the data by the mirroring effect in the disks.

It has the property of reviving the data as quick as possible and also has high speed working due to the many drive thus has high error tolerance.Thus RAID 1 is the appropriate raid.

6 0
3 years ago
Roses are red, violets are blue, I'm going to ki.ll myself, to make life better for you.
Shtirlitz [24]

Answer:

i like this poem helps out the world

Explanation:

p,s. deserves brainiest

6 0
3 years ago
Read 2 more answers
Which of the following is true of lossy and lossless compression algorithms?
taurus [48]

B. Lossy compression algorithms are typically better than lossless compression algorithms at reducing the number of bits needed to represent a piece of data.

7 0
3 years ago
Other questions:
  • Select three examples of cryptographs. Security tokens Shared-key Malware Firewalls Message authentication code Public-key
    7·2 answers
  • Currently, there are two major techniques used to develop programs and their procedures. name and describe them. html editor key
    11·1 answer
  • ___ is the technology used by smart phones to send text messages.
    6·1 answer
  • Help me asap please
    15·1 answer
  • As the first step, load the dataset from airline-safety.csv by defining the load_data function below. Have this function return
    9·1 answer
  • Select the correct answer.
    14·1 answer
  • HELP ASAP. Which of the following is the best example of an installation issue? A computer can’t find the file that it needs to
    7·1 answer
  • Name 3 things that you use daily that are considered computers?
    6·1 answer
  • Why did NFL equip its players with RDIF tags?
    13·1 answer
  • Which join is made with the following query?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!