1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lubov Fominskaja [6]
2 years ago
6

You are building a gaming computer and you want to install a dedicated graphics card that has a fast GPU and 1GB of memory onboa

rd. You need to make sure that you have the right connector available on your motherboard. What type of connector would be appropriate?
a. PCI-Express
b. IDE
c. PCI
d. SATA
Computers and Technology
1 answer:
Vilka [71]2 years ago
6 0

Answer:

a. PCI express

Explanation:

<em>PCI express</em> (Peripheral Component Interconnect Express) is a high speed serial bus and commonly used motherboard interface for  Graphics card, wifi, SSDs and HDs hardware connections. Simple PCI can also be used but PCI express has more error detection accuracy lesser number of I/O pins and better throughput as compared to simple PCI.

You might be interested in
Compared with a star topology, a hierarchical topology: a. is more effective at handling heavy but short bursts of traffic. b. a
Eduardwww [97]

Answer:

c. offers a great deal of network control and lower cost.

Explanation:

A network topology can be defined as a graphical representation of the various networking devices used to create and manage a network.

Compared with a star topology, a hierarchical topology offers a great deal of network control and lower cost.

4 0
2 years ago
One of the first feature films to use 3D animation was called ________. Water World Futureworld Wayne’s World Cool Hand Luke
Vladimir79 [104]
It was called Futureworld

It was published in 1976, it was the first animation that using 3D computer graphics for its animated hand and face.

But they still used 2D digital composting to materialize characters over a background
8 0
3 years ago
Read 2 more answers
An engineer is designing an HTML page and wants to specify a title for the browser tab to display, along with some meta data on
Nady [450]

An HTML is made up of several individual tags and elements such as the head, body. form, frame and many more.

In an HTML page, the meta element and the title element are placed in the head element.

An illustration is as follows:

<em>< head > </em>

<em>< title > My Title < /title ></em>

<em>  < meta charset="UTF-8" > </em>

<em>< / head ></em>

<em />

The head element contains quite a number of elements and tags; some of them are:

  • meta
  • title
  • style
  • script
  • base

And so on.

Hence, in order to use a meta-data element, the meta element has to be placed within the head element.

Read more about HTML elements at:

brainly.com/question/4484498

5 0
3 years ago
In ________- key encryption, two keys, known as a key pair, are created, where one key is used for coding and the other key for
Pavel [41]
In Encryption - ........
7 0
2 years ago
Computers can accomplish many tasks today, but there are still some things they cannot do. Think of some of the things you would
postnew [5]
Record our dream.
Since it is from the future and advanced, it is invalid to argue back that the wish to record our dreams cannot be fulfilled.

From here you can elaborate more ...
7 0
2 years ago
Other questions:
  • What is internet protocol? Language computers use to communicate over the internet Small files that websites put on your PC to s
    8·2 answers
  • Which of these statements best describes an application programming interface?
    5·1 answer
  • Trish has bought a new computer that she plans to start working on after a week. Since Trish has not used computers in the past,
    10·1 answer
  • Match each vocabulary word to its definition.
    11·2 answers
  • Please conduct some research and find an article on Security Threats and please provide link of the article.
    5·1 answer
  • Match each word to its correct meaning.
    7·1 answer
  • In the context of computer and network security, a security system is said to possess _____ when it does not allow data to be co
    13·1 answer
  • 1. Write the full forms of the following.
    5·2 answers
  • What is the difference between posting and transfer in ICT please I need the answer before TMR​
    9·1 answer
  • One word for The characters typed by a user using a<br> keyboard.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!