1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
leonid [27]
3 years ago
10

N, or central processing unit, is also known as the

Computers and Technology
2 answers:
Rzqust [24]3 years ago
6 0
CPU is the Answer to this question.
anygoal [31]3 years ago
4 0
Hello <span>Zayden1


Answer: Central Processing unit is also known as a CPU


Hope this helps
-Chris</span>
You might be interested in
_______ is a process that insures that operations meet data validity standards. For instance, information systems that process c
lutik1710 [3]

Answer:

The answer is consistency

Explanation:

Information systems deal with the retrieval, storage, manipulation and sharing of data for organisational needs. It is important that there are measures in place that corresponds to data validity standards. The process that ensures that operations meet these standards is known as consistency.

This is very necessary for information systems.

5 0
3 years ago
How do you delete extensions on a chrome book bought on the chrome web store?
nirvana33 [79]
If you're using google chrome if you look in the top right corner there are a button with 3 horizontal lines, click it, once you do that go down that list and click settings once you click that, hit extensions on the left side of the screen, after that you will see a list of extension you have find the extension you would like to delete and look far right to the extension and click the trash can. Once you click the trash can a pop up will appear and will say "Confirm Removal"  and under that "Remove_______" If that is the extension you would like to remove continue if not go back to finding that extension If it is click remove
6 0
2 years ago
Read 2 more answers
Which JavaScript defense restricts a JavaScript downloaded from Site A from accessing data that came from Site B?
suter [353]

Java script same origin defense restricts a JavaScript downloaded from Site A from accessing data that came from Site B.

<h3>Defenses and Browser Vulnerabilities</h3>

Java script sandboxing defense JavaScript to run in a restricted environment ("sandbox") and limit the computer resources it can access or actions it can take.

Java script same origin defense restricts a JavaScript downloaded from Site A from accessing data that came from Site B.

Java script limit capabilities restrict JavaScript to not support certain capabilities.

Find out more on browser vulnerability at: brainly.com/question/18088367

5 0
2 years ago
16 POINTS
Nostrana [21]
It think it's a Nested List.
Im so sorry if this is wrong
6 0
3 years ago
if you want to present slides to a fellow student or co workers which productivity software should you use to create them?
Aleonysh [2.5K]

I think a presentation would be the answer.

Hopefully this helps, have a good day.

6 0
2 years ago
Other questions:
  • The ____ file permission category in unix/linux systems typically entails all permissions and is designated by the letter u.
    7·1 answer
  • PLEASE HELPP!! WILL MARK BRAINLIEST!!~~~~~
    11·1 answer
  • 6.Decreasing a telescope's eyepiece focal length will:
    7·1 answer
  • Write the definition of a method printDottedLine, which has no parameters and doesn't return anything. The method prints to stan
    12·1 answer
  • T FROW PYCW GCYN TA T ODYHP WQROW TW<br><br> Someone decode pls
    14·1 answer
  • In 2d design, form makes what possible?
    15·1 answer
  • Gina is upgrading your computer with a new processor. She installs the processor into your motherboard and adds the cooling syst
    7·1 answer
  • What is the technological singularity and what are the dangers it brings to man
    12·1 answer
  • What is social media ​
    13·2 answers
  • if a second system failure occurs while the first recovery is in progress, what needs tobe done after the system recovers for th
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!