1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sdas [7]
3 years ago
9

How many pieces are there in a normal laptop??? Good luck and solve carefully

Computers and Technology
1 answer:
polet [3.4K]3 years ago
4 0

What do you mean pieces? Like Laptop components? If so then motherboard,ram,cpu, and psu for a basic laptop so 4 I guess (5 if you want to include a gpu).

You might be interested in
In a certain computer program, two positive integers are added together, resulting in an overflow error. Which of the following
Airida [17]

The option that best explains why the error occurs is that The program can only use a fixed number of bits to represent integers; the computed sum is greater than the maximum representable value.

<h3>Can programs represent integers?</h3>

An integer value is known to be often listed out in the source code of a program in a way called a sequence of digits that is said to be optionally prefixed with + or −. Note that some programming languages do use other notations, like hexadecimal.

Computers are known to use a a fixed number of bits to show an integer. The most -used bit-lengths for integers are known to be 8-bit, 16-bit, 32-bit or 64-bit.

Learn more about errors from

brainly.com/question/11472659

8 0
2 years ago
You are working on a project and need to be able to access the content from home and share the files with other team members. Th
inn [45]
Local server so you can all you use if you guys are near
5 0
4 years ago
Read 2 more answers
What number will be output by the console.log command on line 5?
bagirrra123 [75]

Answer:

The output is 35

Explanation:

Required

Determine the output on line 5

We start by analysing the program line by line.

On line 1: kit = 20

On line 2: roo = 10

On line 3: kit = kit + 5

Substitute 20 for kit.

So, we have

kit = 20 + 5

kit = 25

On line 4:

roo = kit + roo

Substitute values for kit and too

roo = 25 + 10

roo = 35

On line 5: Output roo

So, 35 is displayed as an output

4 0
3 years ago
How do you change the order of the slides in your presentation within the outline pane? Drag icon up or down Delete slide icon C
Amiraneli [1.4K]

Answer:

Rearrange the order of slides

In the pane on the left, click the thumbnail of the slide that you want to move, and then drag it to the new location. Tip: To select multiple slides, press and hold Ctrl while you click each slide that you want to move, and then drag them as a group to the new location.

Explanation:

7 0
3 years ago
Cindy visits her favorite website on a lunch break using a hospital computer. After she downloads a file, she notices that the c
TiliK225 [7]

<u>Explanation:</u>

<em>Remember, </em>Malware is a word coined from the words Malicious-Software (Mal...ware). Thus, Malware could be defined as software that is intentionally designed by cybercriminals to gain access or cause damage to a computer or network.

a. Cindy may learn the difference between these two techniques used to create a malware attack:

  • through downloads from malicious websites: An attacker may design a malicious website; in which unsuspecting users who visit the site may click to download certain files, but these are actually malware software been installed.
  • through malicious emails: This email may contain attachments which if opened or downloaded by an unsuspecting user would infect their computer with malware.

b. Here are some common suggestions;

  • Never open attachments from strange email addresses.
  • install a paid antivirus software.
  • be mindful of websites with too many ads.
4 0
3 years ago
Other questions:
  • Multiple choice
    9·2 answers
  • What is transaction model?
    9·2 answers
  • In what other game can kids line up in a row
    6·1 answer
  • Hi, I just have a few questions from my digital tech assignment.
    14·2 answers
  • A source is:
    15·2 answers
  • What does the following Boolean operators do?<br>AND function<br>OR function<br>NOT function​
    8·1 answer
  • how does a demilitarized zone (dmz) work. A.By preventing a private network from sending malicious traffic to external networks
    10·1 answer
  • Imagine that you were hired to create the label for a new brand of soup. The client wants to emphasize that the soup has homemad
    10·1 answer
  • Please list 15 safety rules that you think should be practiced in the Computer Technology classroom/lab.
    12·1 answer
  • Describe the differences and similarities between the most common operating systems used for Mac, PC, and Linux in
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!