hope this helps, i'm a beginner so this might not be the most concise method
Answer:
Explanation:
The arithmetic logic unit (ALU) performs mathematical, logical, and decision operations. It can be divided into the arithmetic unit (responsible for addition, subtraction, multiplication and division). And logic unit (responsible for comparing, selecting, matching and merging different data or information). The power and efficiency of the CPU depends on the design of the ALU.
Next up is the control unit (CU) which directs all the processor’s operations. It’s where the CPU reads and interprets requests from memory and transforms them into a series of signals (binary). Then it sends the operation to various parts of the laptop as instructed. The CU calls the ALU to perform the necessary calculations. It also coordinates all input/output devices to transfer or receive instructions.
The main job of the memory unit is to store data or instructions and intermediate results. It’s divided into primary memory and secondary memory to supply data to other units of the CPU. It allows the CPU to perform functions requested by programs like the operating system without having to ask RAM.
Another element of the CPU not depicted in the diagram is transistors. To carry out calculations, binary information (ones and zeros) is stored in these microscopic switches. They control the flow of electricity depending on whether the switch is ON or OFF. Signals turn off and on different combinations of transistors to perform calculations. A very thin silicon chip can contain several hundred million transistors.
Answer:
I probably won't awnser them all but I'll try my best
Explanation:
Hacking is a breach of privacy online usually caused by some kind of malware injected into your device there's multiple types of this program or files malware which simply damages and harms your device. A Trojan horse is a program which tricks you by selling you a fake product which has code in it which has code which gives the hacker remote access to your device this program is usually free and masked like a crack or patch of a certain program. U got the second an third question with this one so u can just divide it into pieces. Piracy is Hacking but this time the hacker is stealing ur information through the malware. Invasion of privacy can have multiple forms online and offline. Online intrusion is when a service gives out information you entrust to it while off line Intrusion is stalking trespassing blackmail etc.
Answer:
- common = []
- num1 = 8
- num2 = 24
- for i in range(1, num1 + 1):
- if(num1 % i == 0 and num2 % i == 0):
- common.append(i)
- print(common)
Explanation:
The solution is written in Python 3.
Firstly create a common list to hold a list of the common factor between 8 and 24 (Line 1).
Create two variables num1, and num2 and set 8 and 24 as their values, respectively (Line 3 - 4).
Create a for loop to traverse through the number from 1 to 8 and use modulus operator to check if num1 and num2 are divisible by current i value. If so the remainder of both num1%i and num2%i will be zero and the if block will run to append the current i value to common list (Line 6-8).
After the loop, print the common list and we shall get [1, 2, 4, 8]
Answer: without satellites there would be no way for the world to communicate
Explanation: