1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marta [7]
3 years ago
11

List the memory units inside and outside of the CPU, along with short descriptions of their

Computers and Technology
1 answer:
Vitek1552 [10]3 years ago
6 0

Answer:

RAM

ROM

Hard Drive

Registers(Accumulator, Address Register, Storage Register, General Purpose Register)

Explanation:

CPU(Central Processing Unit)  is the heart of the computer. it is useful for instruction execution . it mainly contains Control Unit (CU) and Arithmetic Logical Unit(ALU).

when CPU control unit wants to execute an instruction then it fetches the instruction from secondary memory(Hard Disk) to Main Memory(RAM) and read that from there. RAM is faster compared to Hard disk but it is not permanent storage. Useful to store data and instructions temporarily for execution.

when CPU performs Arithmetic and Logical Operations then it uses following registers to perform those operations. Register are a special type of  memory location which is costly and very faster. These are also temporary storage locations

Accumulator :Collects the result of computation.

Address register : which keeps track of where a given instruction or piece of data is stored in memory.

Storage register: which temporarily holds data taken from or about to be sent to memory.  

General-purpose register :which is used for several functions.

You might be interested in
If you were practicing keyboarding and the excercise contained the letters q,o,e,p,r and t, what section of the keyboard are you
AfilCa [17]
Top row keys i belive sorry if im wrong

3 0
3 years ago
When text is used as a Hyperlink, it is usually underlined and appears as a different color.
Artist 52 [7]
True it usually shows up with a blue underline
7 0
3 years ago
What is the "key" to a Caesar Cipher that someone needs to know (or discover) to decrypt the message? a) A secret word only know
Tpy6a [65]

Answer:

The number of characters to shift each letter in the alphabet.

Explanation:

Caeser Cipher is the technique of encryption of data, to make it secure by adding characters between alphabets. These are the special characters that make the message secure while transmitting.

According to the standards, For Decryption, we remove these special characters between alphabets to make message understandable.

<em>So, we can say that,to de-crypt the message, the number of characters to shift each letter in the alphabet.</em>

3 0
3 years ago
What are some of the risk associated with professional emails
noname [10]

Answer:

the answer is its a lot of riskes you would have to worry about tour email getting haacked into and lossing all of your personal information

Explanation:

5 0
3 years ago
Consider the following scenario: "You are an assistant to the accounting manager for a small company that sells sports equipment
Rzqust [24]

Answer:

1. Microsoft Excel helps data analysis through different spreadsheet queries and operations options.

2. Input data to the analysis of sales by product is required for the development of formula and extracting results.

3. The information of data source and frequency of report is required to start the work.

Explanation:

1. Microsoft Excel tool can be used to calculate the results of equipment. Obtained results can be displayed in charts and graphs from the excel.

2. Information like the quantity of sold items, remaining items are required to produce accurate, useful analysis.

Before starting assignment accounting manager will be asked the following questions.

1) Where does the input data come from?

2) Is analysis required on a daily basis or once for all provided data?

3) Is Summary is in the form of tabular data, Graphical data, or Both?

4 0
4 years ago
Other questions:
  • Describe a situation where it would be appropriate to use each of the six leadership styles described by Daniel Goleman
    7·1 answer
  • What is the purpose of network permissions?
    11·2 answers
  • Suppose we are working with an error-correcting code that will allow all single-bit errors to be corrected for memory words of l
    5·1 answer
  • To type a small letter "z", you would use the right little finger. (5 points)True False
    9·1 answer
  • The Blind carbon copy (Bcc) should be used when you want to __________.
    13·2 answers
  • List the steps you took to configure SERVERC and take a screen shot of the Connect to DNS Server dialog box by pressing Alt+Prt
    11·1 answer
  • Which statement compares the Autofill and Flash Fill features?
    9·2 answers
  • Cache memory and RAM both are based on transistor based then why cache memory is needed if we already have RAM (Random Access Me
    6·1 answer
  • 1k bits equals to how many bits
    12·1 answer
  • We cannot imagine a life without the Internet. Imagine that you had to live without being connected to the Internet. Discuss the
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!