1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ahrayia [7]
2 years ago
5

The physical parts of the computer that you can see and touch are called______.

Computers and Technology
1 answer:
Tatiana [17]2 years ago
5 0
Physical parts of computer: Computer Hardware
You might be interested in
D. Convert binary fraction .10112 to Decimal fraction.
Vaselesa [24]
To convert binary fraction to decimal fraction, we first write the given

.1011 (base 2)

The process of conversion is to break down to its decimal constituent,

.1011 (base 2) = (1*2^-1)+(0*2^-2)+(1*2^-3)+(1*2^-4)
.1011 (base 2) = 0.5 + 0 + 0.125 + 0.0625
.1011 (base 2) = 0.6875 (base 10)

<em>ANSWER: 0.6875 (base 10)</em>
6 0
3 years ago
What are the ways of closing an Microsoft word application? ​
Juliette [100K]

Answer:

By pressing key ALT and F4 to close a window application.

Explanation:

<em>Closing Microsoft application comes in different ways such as: </em>

<em> a. Pressing ALT and F4 to close an active window application. </em>

<em>b. Press the X button at the upper right of the screen. </em>

<em> If you are using a MAC or apple computer with Windows emulator, you can simply press on COMMAND key and W key to close an active window application.</em>

4 0
2 years ago
How many lines of text are in your questionnaire document
wel

Answer:

*9* lines - I think.

Explanation:

8 0
2 years ago
Name a software program?​
Tju [1.3M]

Answer:

mathematica ,is a software program helps to solve maths equation ...

Explanation:

mark me as brainliest ❤️

6 0
2 years ago
Angela works for an identity protection company that maintains large amounts of sensitive customer information such as usernames
nata0808 [166]

Answer:the correct answer is the c)

An insider

Explanation:

Insiders that perform attacks have a distinct advantage over external attackers because they have authorized system access and also may be familiar with network architecture and system policies/procedures.

8 0
2 years ago
Other questions:
  • You must establish credit in order to buy a house true or false
    9·1 answer
  • How can i learn about networks
    15·1 answer
  • Choose two browsers and compare their security features.
    5·1 answer
  • What is the term for the era created by the digital revolution?
    5·1 answer
  • ___________ is a computer processor which incorporates the functions of a computer's central processing unit (CPU) on a single i
    15·2 answers
  • A cpu handless all the instruction that it recieces from hard ware and software which are available on the computer true or fals
    7·1 answer
  • What is bespoke software???​
    9·2 answers
  • Suggest three ways in which celebrating an occasion influences food choices?
    10·2 answers
  • SOMEONE PLEASE HELP ME WITH THIS ILL GIVE YOU BRAINLY IF YOU GET IT RIGHT PLEASE!!!!!
    13·2 answers
  • Ok so I’m using a word document and towards the bottom of the page it stops me from moving my text box any further down even tho
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!