1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Charra [1.4K]
4 years ago
11

What are the core components of a computer system? CPU, RAM, ROM, I/O ports, keyboard CPU, RAM, ROM, I/O ports, system bus CPU,

RAM, ROM, mouse, system bus CPU, RAM, monitor, I/O ports, system bus
Computers and Technology
2 answers:
zimovet [89]4 years ago
8 0
CPU, RAM, ROM, system bus, I/O ports
Nataly_w [17]4 years ago
5 0

Answer:

The answer to the given question is " CPU, RAM, ROM, I/O port, and system bus CPU".

Explanation:

In computer science, term core components stand for the inbuilt component. In other words, we can say that the core component is components that use systemic elements that make up the quality of the authored pages.  

These components are a very important part of the computer. if this component is not on the computer so, computers can not be worked.

That's why the answer to this question is " CPU, RAM, ROM, I/O port, and system bus CPU".

You might be interested in
The term platform as a service has generally meant a package of security services offered by a service provider that offloads mu
Stells [14]

Answer:false

Explanation:

8 0
3 years ago
In a multiprogramming and time-sharing environment, several users share the system simultaneously. This situation can result in
kap26 [50]

<u>Explanation:</u>

a.

  • One user can read the private data of another user-privacy.
  • One user can prevent another user from getting anything done-denial of service.

Indeed, in any multiprogramming and time-sharing environment since the computers of users are networked together, then it is very possible for a bad actor to read the private data of another user, or even prevent another user from accessing their computer by employing a denial of service attack on the network. In other words, the network would be unable to handle the request of users since has been overloaded by another user.

b. a. Yes - if we can ensure that the operating system prevents any sharing of data between users, either for reading or writing and fairly shares the computer, then we can achieve the same level of security.

7 0
3 years ago
A mechanic uses a screw driver to install a ¼-20 UNC bolt into a mechanical brace. What is the mechanical advantage of the syste
velikii [3]

Answer:

15.7 ; 78.5

Explanation:

Mechanical advantage of a screw = Circumference / pitch

Circumference = pi × d

Where :

pi = 3.142, D = diameter

Therefore ;

Circumference = 3.142 × (1/4) = 0.785 in

Pitch = 1/TPI

TPI (thread per inch) = 20

Pitch = 1/ 20 = 0.05

Mechanical advantage = 0.785 / 0.05 = 15.7

Resistance force if effort force is 5lb

Mechanical advantage = Fr / Fe

Fe = effort force, Fr = resistance force

15.7 = Fr / 5

Fr = 15.7 × 5 = 78.5 lbs

7 0
3 years ago
IF ANSWER I WILL BE REALLY HAPPY
butalik [34]

Answer:

C.

Explanation:

7 0
3 years ago
Read 2 more answers
7. What are the two keyboard keys you can press at the same time to use the Paste command? (1.0 points) Lesson 5 (5.0 points)
inna [77]

Answer:

Ctrl + v

Explanation:

7 0
3 years ago
Other questions:
  • Write a program that reads a number in feet, converts it to meters, and displays the result. One foot is 0.305 meters. INPUT and
    8·1 answer
  • (a) Write a SCHEME function (make-change n den) which outputs a list of change specifications. Namely, a call (make-change 11 (l
    8·1 answer
  • #Write a function called alter_list. alter_list should have#two parameters: a list of strings and a list of integers.##The list
    11·1 answer
  • which of these variable declarations will the variable remain uninitialized unless it is explicitly initialized?1)Declaration of
    5·1 answer
  • In many UNIX/Linux data and configuration files are "fields". Sometimes these fields are separated by:
    13·1 answer
  • OTATAYAYYAYYA HAVE A NICE DAY BEAUTIFUL PEOEOEPOPEPELELELEEL
    5·2 answers
  • A mobile operating system is stored on a ___ chip.​
    11·1 answer
  • 19. WHICH KEY ALLOWS YOU TO DELETE AND TYPE OVER TEXTS? *
    5·2 answers
  • Business Rules constraints falls into two categories:
    7·1 answer
  • How long does a seller have to ship an item on offerup
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!