1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexandr1967 [171]
3 years ago
8

1) Name the hardware component that performs EACH of the following functions: a.) Performs calculations and/or comparisons *

Computers and Technology
2 answers:
hammer [34]3 years ago
8 0
The answer would be the CPU (Central Processing Unit). It is essentially the brain of a computer.
Debora [2.8K]3 years ago
3 0

Answer:

The ALU (Arithmetic Logic Unit)

Explanation:

The ALU is a part of the CPU which is responsible for arithmetic (adding and subtracting two numbers) and logic (comparing two values to each other).

You might be interested in
A user is given Read permission to a file stored on an NTFS-formatted volume. The file is then moved to a different folder on a
Sav [38]

Answer:

Permissions do not apply here.

Explanation:

The reason is that FAT partitions do not have files and folders permissions, only have sharing permissions. Therefore, once the file has been removed from the NTFS partition, the restrictions that once applied to it are now gone.

5 0
4 years ago
236. A system such as a printer, smart TV, or HVAC controller, typically uses an operating system on what is called a:
irakobra [83]

Answer:

Embedded System

5 0
2 years ago
Read 2 more answers
Inattentional blindness occurs when individuals do not observe certain objects or events because they are focused on something e
PSYCHO15rus [73]
The answer is True have a good day
5 0
4 years ago
Read 2 more answers
(I'm on my computer btw)why won't Brainly let me message people?
IrinaVladis [17]

Answer:

i do not know i want to do the same thing but it says start answering questions when like i helped a lot of people

Explanation:

6 0
3 years ago
Read 2 more answers
An attacker has hidden an NFC reader behind an NFC-based kiosk in an airport. The attacker uses the device to capture NFC data i
tatiyna

Answer:

Nfc relay attack

Explanation:

The NFC relay attack occurs when data is extracted by an attacker who puts himself in the middle of two parties having a communication with each other. As the message gets to a party, the attacker gets it and modifies it to their taste then passes it on.

This attacker in this question is extracting data by establishing communication between end user devices and reader in the kiosk

5 0
3 years ago
Other questions:
  • identify three of the many shared ethical standards among businesses that are incorporated in codes of ethics
    6·2 answers
  • List five ways in which the type declaration system of a language such as Java or C differs from the data definition language us
    8·1 answer
  • Why is personal responsibility important when considering technology?​
    14·2 answers
  • Write a program that prints the following text: In C, lowercase letters are significant. main() is where program execution begin
    14·1 answer
  • Create pseudocode that could be used as a blueprint for a program that would do the following: An employer wants you to create a
    12·1 answer
  • How does a hard drive work
    6·2 answers
  • Computer applications
    9·1 answer
  • The BCD number for decimal 473 is( ). a) 111011010; b) 010011110011; c) 010001110011; d)0010110110​
    15·1 answer
  • 2. What is the first part of the 3D printing process ?
    11·1 answer
  • Crisp-DM is an open standard process model that contains stages
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!