1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tema [17]
3 years ago
13

List the five parts of a system.describe them.

Computers and Technology
1 answer:
erica [24]3 years ago
4 0
The five main parts of a system are: 

1. The CPU
The CPU is the brain of the computer. It is the main part that does all th thinking and processing.

2. RAM
which stands for Random<span> A</span>ccess Memory. As implied in its name, it can be accessed at random times by the CPU. When you open a program, all the scripts and codes that are running need to be run of a separate memory bank. Thus, the RAM takes part.

3. Drives
Hard Drives, SSDs, USB Drives, and SD cards are all forms of main computer memory. That is where the computer stores the OS, your files, and its instructions.

4. Inputs/Outputs
By inputs and outputs i mean hardware, like Speakers (ouput), Monitors (output), Keyboard (input), and Mouse (input).

5. OS
The OS is the Operating System (e.g. Windows, Linux, Mac), which is the main instructions for the computer. It is what makes your computer usable.
You might be interested in
which tool in administrative tools should you open if you want to view messages to troubleshoot errors? a. resource monitor b. e
VikaD [51]

A tool in administrative tools which you should open if you want to view messages to troubleshoot errors is an: b. event viewer.

<h3>What is an operating system?</h3>

An operating system (OS) can be defined as a system software that's usually pre-installed on a computing device by the manufacturers, so as to manage random access memory (RAM), software programs, computer hardware and all user processes.

<h3>What is an event viewer?</h3>

An event viewer can be defined as an administrative tool that is found in all versions of Windows Operating System (OS) which is designed and developed to enable administrators and end users in viewing the event logs of software application and system messages such as errors on a local or remote machine.

In this context, we can reasonably infer and logically deduce that an event viewer is a tool in administrative tools which you should open if you want to view messages to troubleshoot errors.

Read more on event viewer here: brainly.com/question/14166392

#SPJ1

4 0
2 years ago
How do I write a pseudocode algorithm to read a sequence of number terminated by the number 999 and print the sum of the positiv
Veronika [31]

Answer:Start with the algorithm you are using, and phrase it using words that are easily transcribed into computer instructions.

Indent when you are enclosing instructions within a loop or a conditional clause Avoid words associated with a certain kind of computer language.

Explanation:

5 0
3 years ago
Jonas is an experienced security professional who recently accepted a position in an organization that uses Check Point firewall
vichka [17]

Answer:

CCSA

Explanation:

CCSA is "Checkpoint Certified Security Administrator". This certification is best suited for Jonas.

8 0
3 years ago
+
quester [9]

Answer:

Network administrator

5 0
3 years ago
Read 2 more answers
__________ requires unbiased and careful questioning of whether system elements are related in the most effective ways, consider
Liono4ka [1.6K]

Answer:

The answer is "Critical analysis".

Explanation:

Critical analysis is a part of the operating system, that provides an analysis, which is used to process all bits in a system and run their computer system more efficiently.

  • This analysis is used in contextual writing because It reflects the author's interpretation or perception of the text.
  • This analysis hosts vulnerabilities in current desktop operating systems objectively.
5 0
3 years ago
Other questions:
  • An operating system cannot run from an external drive. true or false
    15·1 answer
  • which tag does not display the text in the browser window and makes the sources code mode readable ?​
    6·1 answer
  • Chris needs to modify the default bullets that are used in a nonnumbered list in word. Which method should he use?
    9·2 answers
  • What registry file contains installed programs' settings and associated usernames and passwords?​?
    13·1 answer
  • Which of these statements is true? Steve Jobs invented the mouse as an input device. Bill Gates invented the mouse as an input d
    6·1 answer
  • What is the impedance mismatch problem? Which of the three programming
    10·1 answer
  • Derek is working at the help desk when he receives a call from a client about an issue with the company’s email. The customer is
    11·1 answer
  • Write the method makeNames that creates and returns a String array of new names based on the method’s two parameter arrays, arra
    9·1 answer
  • In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will
    8·1 answer
  • Need the answer ASAP!!!
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!