1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksi-84 [34.3K]
3 years ago
15

What is good prossesser

Computers and Technology
2 answers:
Komok [63]3 years ago
6 0
It depends on what your using it for, gaming, prob gaming laptops, like alien ware etc, macbook, work, youtubing etc. either then that, prob intel core i3,i5,17 etc
soldi70 [24.7K]3 years ago
4 0
Short Answer:  processor<span> model name. For example, the Intel Core i7-7Y75 is a dual-core chip with a base clock speed of 1.3GHz.

not school related but it's ok
</span>
You might be interested in
ANo _____ works by using the Internet to relay communications; it maintains privacy through security procedures and tunneling pr
dybincka [34]

Answer: virtual private network

Explanation:

A virtual private network, is normally refered to as a VPN is simply referred to as an encrypted connection which is done over the Internet. We should note that it usually take solace from a particular device to th network.

The function of the encrypted connection is to assist in the transmission of sensitive data. It works by using the Internet to relay communications and it maintains privacy through security procedures.

8 0
3 years ago
DLS1 is connected to another switch, DLS2, via a trunk link. A host that is connected to DLS1 is not able to communicate to a ho
zubka84 [21]

Answer:

Switchport does not compromise, switch auto dynamic mode, switch native vlan 66, default swamp vlan enabled to add 99 is the correct answer of the following question.

Explanation:

As configuring 802.1Q warp links, DLS1 is connected to the next switch, DLS2, via a diffusion connection to the local VLAN, that must match on the both sides of the wire, either CDP error signals will be created and data to or from the the original VLAN will not be managed properly.Such instruction must be extended to Fa0/1 on DLS1 to address issues that can not be communicated by a server related to DLS1 to a network tied to DLS1, even though both are in VLAN 99.

6 0
3 years ago
Melanie uses an old compact disk to store her company's contract documents. She finds out that she cannot access any documents b
const2013 [10]

Answer:    The risk of obsolescence

Explanation:  This is in fact the risk that some process, technology or hardware used in the company is outdated, so there are newer, more innovative products, hardware, etc. In this way, the use of such outdated technologies and the like, creates the opportunity to reduce competitiveness in the market, which directly affects the point of each company, which is profit. So in this case too, the risk of obsolescence led to the situation that outdated technology, specifically, the use of an old compact disc, prevents a smooth business process. Not keeping up with new technologies creates this kind of risk, which consequently leads to the inability to access certain data required for the operation of the company, which affects profit.

8 0
3 years ago
What are some harmful outcomes that stem from internet anonymous?
beks73 [17]
This link should help u:

www.bbc.com/capital/story/20150309-the-danger-of-online-anonymity
7 0
3 years ago
________an approach to database and software development that emphasizes "individuals and interactions over processes and tools,
dimulka [17.4K]

Answer:

Agile software development

Explanation:

Agile software development  model is a blend of iterative and steady procedure models with center around process flexibility and consumer loyalty by fast conveyance of working programming item. Nimble Methods break the item into little gradual forms. These assembles are given in emphases.

So in blank space there will be Agile software development

7 0
3 years ago
Other questions:
  • Mary’s computer is running slow and will not load programs or videos. She has tried restarting her computer yet it is still not
    15·1 answer
  • Why does the PC send out a broadcast ARP prior
    14·1 answer
  • A company ABC asked you to design a simple payroll program that calculates and employee's weekly gross pay, including any overti
    9·1 answer
  • Describa las características más importantes de cada procedimiento,difencias entre si Procedimiento Bessemer Procedimiento Sieme
    15·1 answer
  • Hey guys, quick question:<br><br> What are the positives and negative’s of GUI’s??
    5·2 answers
  • Which is a common problem for inserting pictures into placeholders?
    10·1 answer
  • What is the name of the most common connector type used for providing power to various hardware components inside computer case?
    10·1 answer
  • I NEED an example of output plssss​
    13·1 answer
  • How to do a Spreadsheet ??
    6·1 answer
  • alle Mbawah: Attempt 1 How does a bystander become an advocate? By harassing the bully until he or she stops the harmful activit
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!