1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Effectus [21]
3 years ago
12

What are the components that make a computer work?

Computers and Technology
1 answer:
Schach [20]3 years ago
8 0

Answer: Plastic, metal, rubber, wiring, electricity, technology, wifi,  

Explanation: You need  PLASTIC to make a frame for the computer. METAL

to make an exoskeleton under the plastic frame. RUBBER to hold those loose wires and to make sure the electricity doesn't escape and shock you. ELECTRICITY to charge and make the computer runs.  Technology is used for you to log in and out of your computer and WIFI to make sure it doesn't lag.

You might be interested in
The first step in the information systems planning process is to ___________.
Basile [38]

Answer: Analyze the organization's strategic plan

Explanation:

 The initial step in the information system is to first analyze the strategic plan of the organization so that we can easily identify the main objective and challenge.

It is basically archived by enlisting the particular objective and function in the planning of information system in the organization.

All the remining option are involve in the remaining step of the information system planning not in the initial step.

Therefore, analyze the organization's strategic plan is correct as it is the first step of the information system planning.  

7 0
3 years ago
. Write a code to define a linked list node using the above defined structure student (i.e. the data of the node is a student st
enyata [817]

Answer:

struct node{

   student data;

   node* next;

};

Explanation:

The above written is the segment of code is the structure of node of the linked list.The data of the node is type student.So the data of the node of the linked list will consist of the student details and the next is the pointer which holds the address of the next node.

8 0
4 years ago
Which term describes unjust behavior due to a person’s gender or race
Alexandra [31]

Answer:

Discrimination

Explanation:

8 0
3 years ago
In a bubble sort for a list of length n >= 2, in each iteration, the first step is to compare_______.
Hunter-Best [27]

Answer:

the consecutive two elements and swap them based on the value which is larger if we go for ascending order

Explanation:

bubble sort compares 2 consecutive elements of the list and swap them. in one iteration one value will be placed correctly depending on the sorting order either ascending or descending

7 0
3 years ago
Many who move to business-oriented information security were formerly__________ who were often involved in national security or
kirill [66]

Answer:

The information security function

Explanation:

Many who move to business-oriented information security were formerly_____ who were often involved in national security or cybersecurity . All of the above The information security function

5 0
2 years ago
Other questions:
  • Andy wants to touch up his holiday photographs because they appear too bright and the color is washed out. Which software applic
    14·1 answer
  • A ____________________ can be used to hierarchically represent a classification for a given set of objects or documents. A. taxo
    10·1 answer
  • What is the simplest way to permanently get rid of a unwanted file
    12·1 answer
  • How do online note-taking tools support students’ academic goals? Check all that apply.
    9·2 answers
  • A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for
    10·1 answer
  • (1) Prompt the user to input an integer between 32 and 126, a float, a character, and a string, storing each into separate varia
    7·1 answer
  • Write down the steps that you will take to organize your files
    12·2 answers
  • The Software Engineering Code of Ethics and Professional Practice was developed by Select one: a. Computer Professionals for Soc
    7·1 answer
  • Which statement best describes the Tell Me feature in PowerPoint 2016?
    8·1 answer
  • 11. Its collection of toys which could be used in the game via an implanted RFID chip made Activision’s game _______ one of the
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!