1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NISA [10]
3 years ago
13

A technician has been asked to upgrade a processor and needs to do some research. The computer is just a couple of years old. Wh

at are two types of processor packages that could be used inside the computer? (Choose two.)
Computers and Technology
1 answer:
DanielleElmas [232]3 years ago
6 0

Answer:

The two best options can be processors like inlet i7 4.0 GHZ 8th generation processor, and two popular models are core and Pentium for inlet. Similarly for AMD we have 4 GHZ 8 core AMD processors. And two very popular examples are Athlon and Phenom.

You need to check the Graphics, clock speed etc. as well to end up with the best processor. Also make sure that it is motherboard compatible, and to the motherboard that you are having, If number of core is more and frequency is high, it means Processor is better, and same thing applies for generations as well.

Explanation:

The answer is self explanatory.

You might be interested in
Which of the following scenarios describes an IT professional using the Internet and computer system access in an unprofessional
pantera1 [17]

Answer:

All of the above

Explanation:

6 0
2 years ago
Binary is used to store what on a computer?<br> •Data<br> •Dates<br> •Address
solmaris [256]

Answer:

Data................

5 0
3 years ago
Read 2 more answers
DES is a commonly used symmetric encryption algorithm, developed in the mid-1990s by the American government in conjunction with
In-s [12.5K]

Answer:

False

Explanation:

The DES encryption standard is believed to be weakened by the American government by containing shortened key lengths and 'S-boxes' of unknown origin.

5 0
2 years ago
Which of the following is good practice to ensure that you do not get malware on your computer from an online source?
Lina20 [59]

Answer:

go to a authorised site which is secure

Explanation:

5 0
3 years ago
By arranging users into security groups, it is possible to set permissions at a group-level, avoiding the unwieldy alternative o
Anni [7]

Answer:

The department by department is arranging users into security groups to set permission at a group-level.

Explanation:

Team by team is just formed group method but the team been set will work on based on the project. Once the project is getting over then the team group assigned permission has to be disabled or deleted.

 

Department by department is just good methods where each department will have a list of users and easy to assign the group.

user-by-user. is just assigning the rights of each individual user. But if the user has multiple departments login it will be good advice.

organization-by-organization. It is just assigning rights to complete users list in the organization.  

6 0
3 years ago
Other questions:
  • What computer system was the first to run the unix operating system?
    11·1 answer
  • What is called photo and video edition?
    8·1 answer
  • Anyone wanna play roblox?? My user is Tsvetok_luis
    11·2 answers
  • Businesses use spreadsheets to keep track of financial________.
    14·1 answer
  • What does Pentium means?:/
    7·2 answers
  • Which of the following is most accurate?
    10·1 answer
  • Activity
    7·1 answer
  • A Java programmer has developed a GUI with several different fields for inputting values and indicating choices via buttons, all
    15·1 answer
  • What are some examples of productions categorized as non-broadcast productions?
    6·1 answer
  • What are the top 10 most dangerous computer viruses ?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!