1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SpyIntel [72]
3 years ago
13

What part of a computer is the most important?

Computers and Technology
2 answers:
Illusion [34]3 years ago
5 0
The answer would be the CPU (central processing unit) which consists of the processor, read-only-memory (RAM), storage (hard drive), motherboard, graphic card, sound card, and cables to connect the input devices to produce an output.
Nikitich [7]3 years ago
3 0
The CPU is the most important. It is the brains of the Computer.
You might be interested in
Write down a program in SNOBOL thatcalculates the factorial of 7.
Sati [7]

Answer:

         n = f = 7

loop  f = gt(n,1) f * (n = n - 1) :s(loop)

         output =  f

end

Explanation:

3 0
3 years ago
What are the 2 levels of formatting in a word document
goldfiish [28.3K]

Answer:

Paragraph Styles and character formatting (font, color, etc.)

7 0
2 years ago
When you create a user with the useradd command, what is the immediate state of it?
kipiarov [429]

When a user is created in Linux using the useradd command, the <em>immediate state</em> of the created account is locked.

  • The useradd command can be invoked in other to create a new user account using the following command

sudo useradd fast_user

<em>#fast_user</em><em> </em><em>is</em><em> </em><em>the</em><em> </em><em>name</em><em> </em><em>of</em><em> </em><em>the</em><em> </em><em>account</em><em> </em><em>created</em><em> </em>

  • At this point, the account has been created but it will be locked until the required login details are set. This can be achieved using the line ;

sudo passwd fast_user

Therefore, an account created using the useradd command is in a locked state.

Learn more :brainly.com/question/12135504?referrer=searchResults

5 0
2 years ago
A company has implemented the capability to send all log files to a central location by utilizing an encrypted channel. The log
klemol [59]

Answer:

Install recommended updates.

Explanation:

To resolve this exploit the company has to install recommended updates. Since their encryption is prone or unsecured so to have better encryption or more secured encryption they have to install recommended updates.Since log files getting transferred over this channel so the company would not want to someone mess with their log files.

3 0
2 years ago
What are the components that make a computer work?
Schach [20]

Answer: Plastic, metal, rubber, wiring, electricity, technology, wifi,  

Explanation: You need  PLASTIC to make a frame for the computer. METAL

to make an exoskeleton under the plastic frame. RUBBER to hold those loose wires and to make sure the electricity doesn't escape and shock you. ELECTRICITY to charge and make the computer runs.  Technology is used for you to log in and out of your computer and WIFI to make sure it doesn't lag.

8 0
2 years ago
Other questions:
  • Consider the following classes: public class A { private int myNum; public A(int x) { myNum = x; } public int getNumber() { retu
    11·1 answer
  • T is important to remember to print the return address when printing an
    5·1 answer
  • What color does Sam obtain when he mixes white with a color? Sam is painting a landscape and needs to paint the sky light blue.
    9·2 answers
  • Which of the following types of network can only be accessed by members within a private organization?
    5·1 answer
  • Using this tool to help you to visualize your slides and develop your content
    13·1 answer
  • Betty set up an account on a popular social networking website. she wants to know whether the privacy policy is effective for he
    14·1 answer
  • The first commercially available digital camera was which of the following?
    9·1 answer
  • Which of the following are incident priorities?
    9·1 answer
  • You decide to test an audio clip that you have inserted into your presentation, but before you do that you make sure that the co
    6·1 answer
  • Requests to retrieve data written in a language such as SQL are called…
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!