1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksanka [162]
3 years ago
9

I have science project competition. From where can i buy the parts i dont know any nearby place

Computers and Technology
1 answer:
dangina [55]3 years ago
6 0
Uuuhh how bouut Walmart or anywere u want really

You might be interested in
Which of the following is the core of an operating system that maintains the computer’s clock, starts applications, and assigns
bagirrra123 [75]
The answer is the Kernel.
In computing, the Kernel's job is to manage the I/O requests from the software on your computer and converts them into data processing instructions for the CPU (Central Processing Unit) and the rest of the electronic components of a computer.
 
4 0
3 years ago
1) SuperFetch is a memory-management technique that a) determines the type of RAM your system requires. b) makes the boot-up tim
Ira Lisetskai [31]

Answer:

c

Explanation:

It preloads the apps and softwares that you use most into thr memory so that they can boot up faster.But it consumes more ram.

5 0
3 years ago
1. Potential incidents represent threats that have yet to happen. Why is the identification of the threat important to maintaini
lawyer [7]

Any test practices end-user he or she does by step by step process for quality testing. Some end-user will have a checklist to do while testing any software or hardware installing.

A hacking end-user has to do the test process if he or she has to follow some steps during testing.

<u>Explanation:</u>

This process is called penetration testing, in other words, it is called pen-testing.

1. In the digital world, security plays an important role. Before any potential incidents taking place, security threats have to handle properly. Before hacking takes place for pc or workstation or desktop, the end-user has to identify and take proper action.

Mostly all threats happen in c:\users\appdata folder in windows operating system

2. Penetration testing is used to for hacking purpose testing.

a. Step by step method is followed.

b. Best practice testing on network security, computer system, web system and find vulnerability check.

c. The pen test method is involved in legal achievements on network

d. To identify vulnerability assessment inside a network

6 0
3 years ago
0.005098 megaliters to liters. record your answer in whole liters
Dmitriy789 [7]
Your answer would be 5098 liters.

Reason being, because there are 1,000,000 liters in one megalitre, so you just multiply 0.005098 by 1,000,000 to get your answer of 5098 liters.
6 0
3 years ago
Who should get the copyright credit for a piece of computer art: the CPU, the software, or the programmer? Explain your reasonin
yulyashka [42]

Answer:

The programmer.

Explanation:

The CPU (central processing unit or simply the processor) is the brain of the computer system, it processes data at a very fast rate depending on it's processing speed. But it only relates to speed of data processing and a link between components of the system.

A software is a program code at executes a task in the system. It a logical and follows an algorithm to solve a given task. Computer systems do not generate  lines of code by itself, but instead, A programmer writes the code to create the software used by the system.

6 0
3 years ago
Other questions:
  • Which Of The Following Is A College Major For Which IT Courses Would Most Likely Be Required?
    9·1 answer
  • A _____ is a member function that is automatically called when a class object is created.
    13·1 answer
  • Angle, oblique, regular, demi, roman, heavy, extra bold, expanded, and compressed are ___________ . Select one: A. type styles B
    10·1 answer
  • Kaitlin likes a particular design theme, but she is not sure about every single color for bullets, backgrounds, etc found in the
    5·2 answers
  • To what would you compare the transport layer?
    14·1 answer
  • You have this code in your program.
    7·1 answer
  • Is an electronics standard that allows different kinds of electronic instruments to
    12·1 answer
  • Please what do you guys think about this ?
    10·2 answers
  • EASY What does the Backspace key do?
    6·1 answer
  • A new thread begins its life cycle by transitioning to the ________ state. Group of answer choices new runnable waiting terminat
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!