1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anygoal [31]
3 years ago
13

Processor is used to process the data.A)true B)False​

Computers and Technology
1 answer:
Scilla [17]3 years ago
6 0

Answer:

True

Explanation:

If you're talking about CPU (Central processing unit), then you are true. It has no memory at all, all it does is process data. That's why you need RAM and hard drives for memory.

You might be interested in
Billy used to take care of his laptop. However, one day he lost his laptop. He lost all his data, and there was no way to retrie
katrin [286]
D he didnt have backup obv

5 0
3 years ago
Read 2 more answers
Ninety-two percent of the new information was stored on magnetic media, mostly in _____.
kiruha [24]

Answer:

The answer to the following question is the option "b".

Explanation:

In the computer system, Hard disks stand for the hard disk drive. It is also known as a hard disk. It locates inside the computer case. The hard disk drive is used to store an electromechanical data. That uses magnetic storage device that store and retrieve data. So the answer to this question is hard disks.

5 0
3 years ago
Some IOS commands store passwords as clear text, but you can then encrypt the passwords with the service password-encryption glo
marta [7]

Answer:

A

Explanation:

Using hashes is preferred because encrypted IOS passwords can be easily decrypted.

8 0
3 years ago
Where can the Ease of Access and Speech Recognition centers be found?
Bess [88]

Answer:

bottom right

Explanation:

at least on windows it's bottom right

3 0
3 years ago
Read 2 more answers
From your fist impression, write down what first comes to mind as to what is good and bad about the way the device works.
nalin [4]

Answer:

xczczxczx

Explanation:

6 0
3 years ago
Other questions:
  • Compare and contrast the TwoFish encryption algorithm with the DES and AES algorithms. In your comparison be sure to compare and
    6·1 answer
  • Olivia needs to get permission to use a graph of data gathered by a trade association she plans to include the graph in a report
    10·2 answers
  • The purpose of a lockout tagout checklist is to​
    9·2 answers
  • The common programming structure that implements "conditional statements" is called an____ statement.
    8·1 answer
  • . The first step in devising security services and mechanisms is to develop a security policy True False
    11·1 answer
  • A small, electronic chip that a manufacturer develops for use in another product (such as a digital camera or microwave oven) is
    11·2 answers
  • The Windows Remote Desktop Web connection that allows users to connect to a work or home computer and access files is considered
    7·2 answers
  • Suppose a family has had a house fire in which
    7·2 answers
  • Software licensed as proprietary
    11·2 answers
  • How will technology help people with disabilities become more transportation independent?.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!