1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anvisha [2.4K]
3 years ago
6

List the seven basic internal components found in a computer tower

Computers and Technology
2 answers:
katrin2010 [14]3 years ago
4 0

These are :

1. Central Processing Unit (CPU). This is the brain of the computer and performs the basic logical, arithmetic , input & output operations of the computer system.

2. RAM. This is Random Access Memory. It is used by the CPU when the computer system is running to temporarily store information which needs to be used quickly and  which would otherwise be lost when there is no power.

3. Motherboard. This is a crucial  part that holds together the  critical components of a computer including the CPU, memory and input/output connectors.

4.Hard drive. This is the component that stores data permanently.

5. Power supply unit. This is  a component that converts mains AC power to DC power for use by the internal parts of the computer.

6. Cooling system. This consists mainly of fans attached to computer enclosures that maintain inflow of cool air and expelling of hot air out of the computer tower.

7. Frame. This is the hard casing that houses  the computer parts protecting them and keeping them together.


 

Alik [6]3 years ago
3 0
1. The Frame
2. Hard drive
3. Mother board
4. Cooling System
5. RAM
6. CPU (Central Processing Unit)
7. Power Supply Unit
You might be interested in
Imagine that you are investigating a crime of fraud, where the suspect is creating false documents. Where might you look for evi
kolbaska11 [484]
You would look in the documents folder on the persons computer. You could also look for photo file types if the perp was using photoshop to make changes to documents and then printing them. 
4 0
3 years ago
Read 2 more answers
Should the security researcher have published exploit code that affects every version of Windows and cannot be patched
grandymaker [24]

Answer:

No.

Explanation:

This is because there is probably the risk of malicious attackers grabbing the published exploit code that affects every window and then utilizes it for dubious purposes. Such as stealing vital information after gaining access.

The most ideal way for the security researcher to go about the exploit code that affects every version of the window is to meet the windows manufacturers, discuss the negative issues of windows software with them and eventually assist them in the software update to troubleshoot the patch.

8 0
3 years ago
Network behavior analysis system __________ sensors are typically intended for network perimeter use, so they would be deployed
amm1812

The answer is inline. An inline sensor is conveyed with the goal that the activity it screens goes through it. Some inline sensors are mixture firewall/IDPS gadgets. The essential inspiration for conveying sensors inline is to stop assaults by blocking movement.

5 0
4 years ago
Microsoft Word Module 3 the answers for online class University MIS
Artist 52 [7]

Answer:

Nope

Explanation:

You can use open office for free

7 0
3 years ago
FIRST AMSWER GET BRAINLIEST​
MA_775_DIABLO [31]

Answer:

agile --> business modeling

RAD --> pair programing

waterfall --> deployment

spiral --> risk analysis

v-shaped model --> integration testing

not too sure about this but i tried

4 0
3 years ago
Other questions:
  • How does limiting a company's scope benefit the company? A. It encourages the company to use division of labor. B. It makes it e
    10·2 answers
  • Switches operate on what layer of the OSI Model
    11·1 answer
  • Which does an icon on the desktop signify?
    12·1 answer
  • The trim video feature allows you to trim your clip by time measurements that are accurate to ____ of a second.
    5·1 answer
  • "If a program attempts to modify (or, sometimes, even to read) the contents of memory locations that do not belong to it, the op
    11·1 answer
  • A file named numbers.txt contains an unknown number of lines, each consisting of a single positive integer. Write some code that
    6·1 answer
  • #Write a function called find_median. find_median #should take as input a string representing a filename. #The file correspondin
    8·1 answer
  • Binary search takes a list of information and divides the list into two parts, one is divided and one is kept.
    15·1 answer
  • Instructions
    13·1 answer
  • Jacob holds a Computer Hacking Forensic Investigator (CHFI) certification. Which of the following responsibilities should Jacob
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!