1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Shtirlitz [24]
3 years ago
12

List the seven basic internal components found in a computer tower

Computers and Technology
2 answers:
egoroff_w [7]3 years ago
6 0
1. Motherboard (you plug all other components to it)
2. Processor (CPU)
3. Memory (RAM)
4. Graphics card
5. Sound card (sometimes integrated with motherboard)
6. Hard Disk Drive (HDD)
7. Power supply unit
Naddik [55]3 years ago
6 0
1)Processor(CPU)-It is or it acts as a "brain" of the computer.It controls the working of all of the hardware and software.It is a logic circuitry that responds to and processes the basic instructions that drive a computer.Its four primary functions are fetch,decode,execute and write-back.
The main components of computer processor are:
i)control unit-which fetches,decodes,executes instructions.
ii)Arithmetic& logic unit(ALU)-which performs arithmetic and logical operations on data.
iii)Registers- which holds instructions and other data..they supply operands to the ALU and store the results of operations.
iii)system clock-the clock is a quartz controlled oscillator supplying timing signals at a fixed rate The signals are used to regulate the execution of instructions and to synchronize the operation of the computer components.
2)Motherboard-it is a computer hardware that holds together many of the crucial components of a computer including the CPU,memory and connectors for input and output devices.
so it serves as the central circuit hub that connects all peripherals.it also regulates the power recieved by the hard drive,graphic cards,CPU and system memory from the power supply.
3)Random access memory(RAM)-It s a form of computer data storage that stores data and machine code currently being used.it is a volatile memory.
4)Hard drive-This is a none-volatile memory hardware device that permanently stores and retrieves data on a computer.
5)Power supply unit-This is the component that converts mains i.e AC to low-voltage regulated DC power from the wall into the right kid of power for the individual parts of the computer.
6)Video card-This is an expansion card which generates a feed of output images to a display frequently.
7)Network card-This is an electronic device that connects a computer to a computer network usually a LAN(local area network)
You might be interested in
The true or false questions.<br><br> 1.egrep can accept multiple filenames as input arguments.
BlackZzzverrR [31]

Answer: True  

Explanation: yes, it is true that egrep can accept multiple filenames as input arguments for example egrep -r "text1/text2", so this will search in all the sub directories . E grep is also known as 'grep -E' which belongs to the group of grep function and we used egrep to separate multiple patterns for OR conditions. This is also very less time consuming if you are going to search multiple input arguments in multiple different logs at the same time.

5 0
3 years ago
What are the XML technologies used in SOA?
saw5 [17]

Answer:

There are three technologies used for implementing the SOA most commonly with Web services are UDDI (Universal Description, Discovery & Integration) , WSDL (Web Services Description Language) and  SOAP (Simple Object Access Protocol) .

Out of them XML technologies are Web Services Description Language (WSDL) and Simple Object Access Protocol (SOAP).

WSDL is an XML language that describes a Web service.

SOAP is an XML Protocol and it is used by client application to communicate with web services.

8 0
3 years ago
Write a program that writes 10 random numbers into a file named numbers using loops.
MariettaO [177]

Answer:

The program in cpp for the given scenario is shown below.

#include <stdio.h>

#include <iostream>

#include <fstream>

using namespace std;

int main()

{

   //object created of file stream

   ofstream out;

   //file opened for writing

   out.open("numbers.txt");

   std::cout << "File opened." << std::endl;

   //inside for loop, random numbers written to numbers.txt using rand()

   for(int n=0; n<10; n++)

   {

       out<<rand()<<endl;

   }

   //file closed

   out.close();

   std::cout << "File closed." << std::endl;

   return 0;

}

Explanation:

1. An object of the ofstream is created. The ofstream refers to output file stream. This is used to create file for write and append operations.

ofstream out;

2. The file named, numbers.txt, is opened using the open() method with the object of ofstream.

out.open("numbers.txt");

3. The message is displayed to the user that the file is opened.

4. Inside a for loop, which executes 10 times, a random number is generated. This random number is written to the file and a new line inserted.

5. The random number is generated using rand() method. Every number is written on  new line.

out<<rand()<<endl;

6. Every execution of the for loop repeats steps 4 and 5.

7. When the loop ends, the file is closed using close() method with the object of ofstream.

out.close();

8. A message is displayed to the user that the file is closed.

9. The header file, fstream, is included to support file operations.

10. The extension of the file can be changed from .txt to any other type of file as per requirement.

11. The program can be tested for writing more numbers to the file.

12. The program can be tested for writing any type of numeric data to the file.

13. The program is written in cpp due to simplicity.

14. In other languages such as java or csharp, the code is written inside classes.

15. In cpp, all the code is written inside main() method.

16.    The screenshot of the output messages displayed is attached.

3 0
2 years ago
Which of the following is planted on an infected system and deployed at a predetermined time?A. Logic bombB. Trojan horseC. Worm
nekit [7.7K]

Answer:

A. Logic Bomb.

Explanation:

A Logic Bomb is a piece of code that is planted in a software system that is infected intentionally to set off malicious function.They are deployed at a predetermined time.

For ex:- a programmer hiding the files that deletes details of the employee who left the company.So these files can never be deleted.

4 0
2 years ago
The computer stores a program while the program is running, as well as the data thatthe program is working with, in __________.
Elena-2011 [213]
<span>While you are working with a document using a program such as wordpad, the document is stored in .exe file</span>
3 0
3 years ago
Other questions:
  • Use your own words to describe how IT/IS can support major functional areas in the business. Discuss at least two of these areas
    14·1 answer
  • 1. The process of creating workable systems in a very short period of time is called
    5·1 answer
  • WILL GIVE BRAINLIEST PLEASE HELP / urgent
    9·1 answer
  • A(n ____ is a named group of formatting characteristics.
    7·1 answer
  • You order a new personal computer. A representative from the store calls to ask if you need CD-copying software in your personal
    12·1 answer
  • What is the least number of bits you would need to borrow from the network portion of a Class B subnet mask to get at least 130
    10·1 answer
  • Which type of microphone uses two metal plates?
    7·1 answer
  • How to convert mkv to avi without losing quality?
    14·1 answer
  • Describe four features of a well designed input screen
    10·2 answers
  • The navigation items for a Lightning app are available on mobile: A. In a special mobile configuration in the navigation menu an
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!