1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tema [17]
3 years ago
13

List the five parts of a system.describe them.

Computers and Technology
1 answer:
erica [24]3 years ago
4 0
The five main parts of a system are: 

1. The CPU
The CPU is the brain of the computer. It is the main part that does all th thinking and processing.

2. RAM
which stands for Random<span> A</span>ccess Memory. As implied in its name, it can be accessed at random times by the CPU. When you open a program, all the scripts and codes that are running need to be run of a separate memory bank. Thus, the RAM takes part.

3. Drives
Hard Drives, SSDs, USB Drives, and SD cards are all forms of main computer memory. That is where the computer stores the OS, your files, and its instructions.

4. Inputs/Outputs
By inputs and outputs i mean hardware, like Speakers (ouput), Monitors (output), Keyboard (input), and Mouse (input).

5. OS
The OS is the Operating System (e.g. Windows, Linux, Mac), which is the main instructions for the computer. It is what makes your computer usable.
You might be interested in
An access control system that grants users only those rights necessary for them to perform their work is operating on which secu
solmaris [256]

Answer:

B. Least privilege                

Explanation:

  • The principle of least privilege an important principle in computer security.
  • It limits the access rights for users and only grant them with the rights that are sufficient for them to perform their required task.
  • For example a user is granted privilege to execute a file or manipulate data or use only the resources that are required for them to perform a particular task.
  • This principle can be used only to limit and control access rights to system resources and applications.
  • The least privilege is beneficial as it reduces the risk of unauthorized access.
  • For example a user whose task is data entry and has nothing to do with controlling access or granting access rights to users, will only be allowed to enter data to the DB by the principle of least privilege.
7 0
3 years ago
What set of code correctly initializes all elements of the array ar to the value 0, given the declaration
Veronika [31]

Answer:

The correct answer is:

C. ndx = 0;

while (ndx < 3) {

ar[ndx] = 0;

ndx++;

}

Explanation:

The declaration given is:

int ar[3];

This means the array consists of three locations and is named as ar.

We know that the indexes are used to address the locations of an array and the index starts from 0 and goes upto to 1 less than the size of the array which means the indexes of array of 3 elements will start from 0 and end at 2.

Now in the given options we are using ndx variable to run the while loop.

So the code to assign zero to all elements of array will be

ndx = 0;

while(ndx<3)

{

ar[ndx] = 0;

ndx++;

}

Hence, the correct answer is:

C. ndx = 0;

while (ndx < 3) {

ar[ndx] = 0;

ndx++;

}

7 0
3 years ago
Strong linkages to customers and suppliers decrease switching costs. true or false
Ratling [72]

Answer:

False

They increase switching costs .

7 0
2 years ago
The function below tries to create a list of integers by reading them from a file. The file is expected to have a single integer
Setler [38]

Answer:

Check the explanation

Explanation:

def get_list_of_integers_from_file(filename):

int_list=[]

for line in open(filename).readlines():

try:

int_list.append(int(line))

except:

continue

return int_list

print(get_list_of_integers_from_file('file.txt'))

 

File.txt:

Kindly check the output below.

4 0
3 years ago
Use the drop down menus to describe how adman can add shapes to his presentation
alina1380 [7]

Answer:

✔ Illustrations

✔ a crosshair

✔ left-click and drag

Explanation:

6 0
3 years ago
Other questions:
  • The length of a hailstone sequence is the number of terms it contains. For example, the hailstone sequence in example 1 (5, 16,
    9·1 answer
  • The inventory tracking system shows that 12 laptop were on hand before a customer brings two laptops to the register for purchas
    9·1 answer
  • Which type of hacker represents the highest risk to your computer?
    9·1 answer
  • Explain and give examples of at least two search engines.
    9·1 answer
  • What are seven main internal parts of a computer
    7·2 answers
  • How can you enter Task Manager in Windows? Select 3 options. press Ctrl + Shift + Tab press Ctrl+Alt+Delete and then click Task
    8·1 answer
  • State why hexadecimal is used to display the error code
    11·1 answer
  • 4. Written record of all transactions in your checking account
    5·2 answers
  • Which four of the following qualify as fair use?
    11·2 answers
  • Can anyone tell me about Microsoft some important features for partical
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!