1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kipish [7]
3 years ago
5

Help, please

Computers and Technology
2 answers:
Lubov Fominskaja [6]3 years ago
7 0

Answer:

SEE THIS LINK WILL HELP U FIND THE ANSWER

https://computerinfobits.com/parts-of-computer-and-their-functions/

Explanation:

mixer [17]3 years ago
4 0

https://turbofuture.com/computers/Computer-Basics-Examples-of-Hardware

Visit this link and it will help you...

You might be interested in
What are the differences and similarities of computer virus and biological virus. Give 4 examples
Papessa [141]

Answer:

During recent months, we’ve witnessed an unexpected and distressing pandemic of a coronavirus disease. What I find especially distressing about it is how the worldwide adversity was caused by just a tiny thing — namely, a virus called SARS-CoV-2.

However, biological viruses have always been a potent threat to humanity, as historic pandemics have proved. No wonder viruses became an ideal weapon model in a totally different world — a world of programming. The first computer viruses were created as early as in the 1970s. Starting as pranks, they evolved to become a major threat to the stability of computer networks worldwide. And the more I think of viruses, both biological and digital, the more amazed I am by their similarities.

We don’t know what kind of challenges viruses of either type will cause in the future, but understanding how they infect, the symptoms they induce, how they spread, and the damage they can cause can help us fight both.

The Common Thread

Let’s start with the basics: What does a virus look like?

computer virus of 1999

Click image for larger version

Figure 1: Pictured on the left is an electron microscope image of SARS-CoV-2 particles - the pandemic-causing coronavirus. Source: NIAID-RML. Pictured on the right is a code snippet of a Melissa, the notorious email-spreading computer virus of 1999. Source: Gizmodo.

The images in Figure 1 might look vastly different, but, essentially, they’re the same: a string of code. In the coronavirus, it’s the RNA genome in a shell; in Melissa, it’s computer code. In both cases, the code is an “instruction” for the virus to follow.

Explanation:

here is your answer hope you will enjoy

thank you

6 0
3 years ago
Martin is responsible for translating the script into a visual form by creating a storyboard. Which role is he playing?
iren2701 [21]

Answer:

The correct answer to this question is given below in the explanation section.

Explanation:

The question is about to  identify the role of Martin, who converts script into visual form by creating a storyboard.

The correct answer to this question is:

Martin is playing the role of <u>Production Design</u> and he is working at the position of the <u>production designer</u>.

Before shooting a film, the production designer is the first artist who converts script into a visual form such as creating storyboards. And, that storyboard serves as the first film draft.

A storyboard is a series of sketches, paintings, etc arranged on a panel to show the visual progress of the story from one scene to the next.   These storyboards are used from start to finish of the film. Because these storyboards or sketches serve as the visual guide for the director of the film throughout the production.  

8 0
3 years ago
After several configuration changes are made to a router, the copy running-configuration startup-configuration command is issued
adoni [48]

Answer: NVRAM(Non-volatile random-access memory)

Explanation:Non-volatile random-access memory(NVRAM) is the memory that has a non-volatile nature.It is used for retaining of the data even when the system gets switched off .

This memory uses the power source from the CMOS battery for executing the functions. It is designed by using the pin configurations containing 24 pin in DIP(Dual inline package). So the situation mentioned in the question of storing the changes will appear in the NVRAM.

4 0
4 years ago
Abram was asked to explain to one of his coworkers the XOR cipher. He showed his coworker an example of adding two bits, 1 and 1
OleMash [197]

XOR is 1 when either of the inputs is 1 but not when they both are.

1 xor 1 = 0

3 0
3 years ago
When designing a website, Claire creates a color palette for the web pages. How can the color palette help Claire design effecti
Vilka [71]
Consistency and unity
highlight important content
4 0
3 years ago
Other questions:
  • _____ learners prefer to interact with others on group projects.
    8·1 answer
  • Most information security incidents will occur because of _________. Select one: a. Users who do not follow secure computing pra
    10·1 answer
  • You are asked to add speech to a robotic receptionist that sits at the front desk of a large organization. The robot has an anim
    10·2 answers
  • Pauline is a manager of a team in a large website design firm. Her team members come from diverse cultural backgrounds. The perf
    15·1 answer
  • How does the actual amount left to spend differ from the budgeted amount for the remaining three months of the project?
    12·1 answer
  • How to do “Pseudocode” and “FlowChart” in this question ? <br><br> Please Help mee
    9·1 answer
  • LISTEN I NEED EVERY SINGLE BRAINLY USER TO RE POST THIS THERE IS A USER WHO JUST SAID THEY ARE GOING TO KILL THEMSELVES PLEASE C
    12·2 answers
  • Programs which were typically reserved for college-level classes such as computer animation and CAD programs are now being appli
    13·1 answer
  • What is Digital Etiquette? Explain in your own words
    13·1 answer
  • Đánh giá hoạt động thanh toán điện tử của sinh viên
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!