1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sdas [7]
3 years ago
11

Seven basic internal components

Computers and Technology
1 answer:
Gnom [1K]3 years ago
3 0
The power supply unit<span>, </span>central processing unit, hard disk drive<span>, </span>RAM modules<span>, </span>motherboard<span>, video card and a sound card.</span>
You might be interested in
Why do some people argue that tech companies like Apple should do more to address the smartphone addiction problem?
Neko [114]

Answer:

Cause It Will Help Make A Fix For The Issue

Explanation:

Does This Help?

5 0
3 years ago
Which of the following views would you use to see your Web page while working on it?
brilliants [131]
D) Alt Tags thats the answer i think
8 0
3 years ago
Which of the four digital-to-analog conversion techniques (ASK, FSK, PSK or QAM) is the most susceptible to noise? Defend your a
grigory [225]

Answer:

ASK

Explanation:

The correct answer is ASK which denotes Amplitude Shift Keying. This is essentially a type of amplitude modulation which represents the binary data that comes varied forms right in the amplitude of a signal.

Now the reason why It is the most susceptible technique to noise is due to the fact that between frequency, phase & amplitude, amplitude is the one that is most susceptible to being affected by noise when compared to the other two.

3 0
3 years ago
One or more messages about the same topic is a ?
elena55 [62]

Answer:

This is the case of redundancy or the repeated data. It means that the same data is being repeated again and again. And its the wastage of time and memory both. The redundancy must be removed in all circumstances. However, we cannot as without it proper normalization of data is not possible.

Explanation:

The answer is self explanatory.

6 0
3 years ago
How frequently should computers containing ehr information be backed up?
geniusboy [140]
Explain what is meant by a limited data set and how this HIPAA rule may affect medical assistants
7 0
4 years ago
Other questions:
  • This is a free point thing!! I am giving 100 points!! Anyone wanna talk!!!!
    11·2 answers
  • Which of the following is not an example malicious code<br> A.Trojan horse B.worm C.virus D.spygear
    10·2 answers
  • Jax needs to write a block of code that will organize a list of items alphabetically. Which function should he use? append() pri
    12·1 answer
  • 1. Define a C++ function with the name evaluateBook. The function receives as one argument the name of the file to be processed
    13·1 answer
  • Legal functions are the most important area of IG impact. Under the FRCP amendments, corporations must proactively manage the e-
    9·1 answer
  • One of the most common encryption protocols in use today. It is an asymmetric protocol that enables the sharing of a secret key
    7·1 answer
  • what will happen to the contents of the destination ell if you copy the contents of the source cell into the destination cell
    7·1 answer
  • Select the correct answer.
    5·1 answer
  • Why are my texts green when texting another iphone.
    14·1 answer
  • "write a program to play and score the paper-rock-scissor game. each of two users types in either p, r, or s. the program then a
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!