1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cupoosta [38]
3 years ago
14

Fill in each blank with the correct step from the fetch-execute cycle.

Computers and Technology
1 answer:
Mariana [72]3 years ago
4 0

Answer:

1 - instruction fetch

2 - instruction decode

3 - instruction execute

4 - result return

You might be interested in
Which option describes wearable technology? A. the incorporation of technology into objects we use regularly B. rugged technolog
vichka [17]

The correct answer is

A.  the incorporation of technology into objects we use regularly

#Platogang

8 0
3 years ago
Which type of cell references are locked and NOT automatically updated when it’s copied
dsp73

Hi I would have to say B sorry if this answer is sucky but I'm trying my best to help you :D

4 0
3 years ago
How can this be achieved? Universal Containers stores invoices in SAP. Users want to view invoice data onthe related Account rec
Nookie1986 [14]

Answer:

Option B  and  Option D

are correct answers.

Explanation:

To view the invoice data on the related account records in sales force when invoices are stored in SAP we must:

  • Create an External Object connected to an invoice table in SAP

           OR

  • Connect to an O-Data Publisher Service for SAP databases.

SAP can be defined as Systems, Applications and Products. SAP is basically a software which has a backbone of SAP ERP (most advance Enterprise Resource Planing). SAP software helps to manage many business areas by providing powerful tools that include financial and logistic areas.

<h2 /><h2>I hope it will help you!</h2>
6 0
3 years ago
What are web protocols.
RoseWind [281]

Answer:

Web protocols are a set of standards used to exchange information. It ensures that code can be modular and portable.

7 0
2 years ago
Read 2 more answers
안녕 또 나야 난 너에게 미래의 메시지를 전하러 왔어 01100011 01101111 01101101 01101111 00100000 01111001 00100000 01101100 01101111 00100000 01101101
sashaice [31]

Answer:

i think its 01100001

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • Which string method counts the number of characters in a string?
    5·1 answer
  • Which of the following are reasons why it is important to properly recycle electronic equipment? Select all that apply.
    14·2 answers
  • The faster alcohol is consumed, the faster it reaches the __________.
    9·2 answers
  • Select the answer that best describes the activity
    5·2 answers
  • Read the excerpt from The Code Book. Other attacks include the use of viruses and Trojan horses. Eve might design a virus that i
    13·1 answer
  • What type of Microsoft Server serves as an email server?
    7·2 answers
  • This can change the fit of your respirator. A) A mustacheB) A beardC) Weight gainD) All of the above
    15·1 answer
  • Using a tag, set the color to orange for all tags
    13·2 answers
  • Protecting data security, privacy, and integrity are important database functions. What activities are required in the DBA's man
    10·1 answer
  • ______________________ can run on a workstation or server and is at the heart of all business applications.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!