1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Jobisdone [24]
3 years ago
14

Which part of the computer stores and processes data?

Computers and Technology
1 answer:
lilavasa [31]3 years ago
3 0

it is A the hardware im pretty sure but dont put my answer in im not completley sure

You might be interested in
Which type of workplace culture emphasizes the development of new skills?
Archy [21]
Involvement is the answer just took it. thank you

6 0
4 years ago
Read 2 more answers
When you arrive at work one morning, your inbox is full of messages complaining of a network slowdown. you collect a capture fro
elena55 [62]

You can compare it to the network baseline

8 0
4 years ago
What is the difference of Information Technology to any other field of study?
Darya [45]

Answer:

The field of information technology, or IT, covers the support, administration, and design of telecommunications and computer systems. Some positions in this field include system analysts, software programmers, computer scientists, computer support specialists, and network and database administrators.

Explanation:

4 0
2 years ago
What Defines Form?
Aleks04 [339]
The shape and texture defines form.
3 0
4 years ago
Which feature of a network intrusion prevention system (NIPS) uses a lists of known bad IP addresses to protect the network?
mario62 [17]

Answer:

Reputation based System

Explanation:

In this type of security system a file or IP address is classified as safe or unsafe based on the reputation, this can make unsafe conditions predictable and intrusion prevented with ease. it is easy to identify danger if the potential source of it is marked. This technology is usually employed by anti-virus softwares, anti-malwares, or other software systems that is used for security.

7 0
4 years ago
Other questions:
  • What will be displayed after the following statements have been executed? int x = 15, y = 26, z = 32; x = x + 12; y = y/6; z -=
    15·1 answer
  • Which network component allows computers to communicate on a network without being connected directly to each other?
    9·1 answer
  • What types of statements are made by your teacher to indicate what you should include in your notes? Give three examples of thes
    6·2 answers
  • The Michael Porter Diamond of National Advantage is a framework that explains why countries foster successful multinational corp
    11·1 answer
  • At each layer of the OSI model, data is appended to the original message and then sent on to the next lower layer. What is this
    10·1 answer
  • Answer this correct and get brainly
    5·2 answers
  • In attempts to improve their contribution to the environment a company decides to adapt green computing. Which of these techniqu
    13·1 answer
  • An algorithm is a step by step process that describes how to solve a problem and/or complete a task, which will always give the
    14·1 answer
  • Aurelia is designing a user interface for a new game app. Which of the following should she taken into consideration for the use
    7·1 answer
  • Which of the statements below is true?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!