1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
asambeis [7]
3 years ago
15

Draw internal architecture of computer​

Computers and Technology
1 answer:
ohaa [14]3 years ago
4 0

Answer:

If this is good, let me know in the comments and I'll draw it

Explanation:

You might be interested in
In one or more complete sentences, explain about vehicle maintenance and vehicle safety
aivan3 [116]
Vehicle maintenance is important because without them the vehicle would not function properly and could be a safety hazard. Vehicle safety is important because without it we could end up seriously injured or even killed, vehicles can be very dangerous if handled irresponsible and the proper safety methods are not used.<span />
5 0
3 years ago
Read 2 more answers
Using the Caesar cipher, "HELLO" is encrypted to "OLSSV" by applying a shift of 7. The number 7 is considered the __________
Semenov [28]

Answer:

The offset

Explanation:

In the question, we understand that the original text is HELLO and the encrypted text is OLSSV.

It should be noted that O replaced H, L replaced E, S replaced L and V replacement O.

This is made possible by a term refered to as offset.

The offset is used to determine the character that will replace another when it is encrypted.

7 characters after H is O; this is same for every other characters in the text.

8 0
3 years ago
_________ cards contain a chip that can store a large amount of information as well as on a magnetic stripe for backward compati
wariber [46]

Answer:

Smart

Explanation:

The RFID or the radio frequency identification is an electronic device that stores information electronically. It stores and makes available the information which is stored electromagnetically, once the user is authenticated.

This technology is implemented in market places and other individual activities. It is implemented in cards called smart card for ease of payment transaction and promote online commerce (e-commerce). It is also implemented in smartphones.

3 0
3 years ago
Analog method is also known us
Andreas93 [3]

Hi there! Thank you for choosing Brainly to ask your question. I would be happy to assist you today by answering. You were a little bit unclear, but I hope this answers your question. - Analogue methods refer to all manual methods where no computers are used, but with the advent of digital computers the term analogue is also used for analogue methods of computing data. An analogue signal varies continuously, according to information, and thereby the data are represented in a continuous form.

8 0
3 years ago
Google Project Fi customers can set up their phones as a mobile Wi-Fi router and allow their laptops or tablets to surf the Inte
mart [117]

Answer: Tethering

Explanation:

 The wireless tethering is one of the process in which the one person sharing their phone's data, information or file to the another mobile devices over the internet by using the various types of wireless devices such as Bluetooth, Wifi and the universal serial bus cable (USB).

According to the given question, the google project consumers setting up their phones with the WIFI routers and they allow their devices such as tablets, laptops for the purpose of surfing data by using the internet connection.

Therefore, this process is known as the wireless tethering.    

7 0
3 years ago
Other questions:
  • given the numerical value 1010101.11, which of the following number systems is most likely represented.
    11·1 answer
  • What is the code for loading image in matlab
    15·1 answer
  • In terms of object-oriented programming,after class is defined,________ can be created for that class.
    15·1 answer
  • Tom is the aerobics coordinator at a fitness center. He needs a more efficient way for his instructors to share information. Cla
    13·2 answers
  • _____ is a program that allows a person using one computer to access files and run programs on a second computer that is connect
    11·1 answer
  • Which rule should be followed to stay safe online
    5·1 answer
  • Which of the following is NOT a safe skill you can use to reduce your risk
    11·2 answers
  • Describe two different examples of potential conflicts, and explain why these conflicts can have a negative impact on
    14·1 answer
  • The average number of entities completed per unit time -- the output rate -- from a process is called ____.
    9·1 answer
  • How to solve level 53 on rapid router?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!