1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nostrana [21]
3 years ago
5

What are the 7 basic components found in a computer tower

Computers and Technology
2 answers:
labwork [276]3 years ago
8 0
1. Motherboard (you plug all other components to it)
2. Processor (CPU)
3. Memory (RAM)
4. Graphics card
5. Sound card (sometimes integrated with motherboard)
6. Hard Disk Drive (HDD)
<span>7. Power supply unit</span>
damaskus [11]3 years ago
5 0
1.CPU(central processing unit) this is the brain of the computer
2.Ram( Random Acess Memory) this determines how much memory your computer can process at one time
3.Motherboard(this holds almost all the major computer componets and transfers all the info
4.Hard drive this holds all your programs, info etc.
5. Power Source, provides power to the whole computer
6 Graphics/Video card.(Optional) this helps with video games
7.disk drive optional if you want to upload a computer base
8. cooling system, if you want your computer to last. a long time it is vital to have a cooling system
9.A frame ,hold all the parts. together.
You might be interested in
What does the following statement do? vector v(10, 2);
Alecsey [184]

Answer:

D) It creates a vector object with a starting size of 10 and all elements are initialized with the value 2.

Explanation:

When you write the statement vector<int> v(10,2); This statement declares a vector or dynamic array of size 10 that is the first parameter and the second parameter is the value with which all the elements in the vector are to be initialized.So in this vector all the 10 values will be initialized with the value 2.It is one of the way of initializing the vector.

3 0
3 years ago
What is a man-in-the-middle attack​
VMariaS [17]

Answer: An attack where the attackers will interrupt a data transfer happening between parties and in which they will pretend to be the legitimate parties.

Explanation: For example think about two people writing letters to each other back and forth. However you, the attacker can intercept the letters and effectively change the message/contents of the letter going to the other person. This is probably not the best explanation, but simply put a man-in-the-middle attack is when an attacker interupts a transfer and pretends to be the legitimate source.

4 0
2 years ago
Read 2 more answers
Antivirus software products require that you update _____ on a regular basis
german
Operating System, as far as I know @[email protected]
5 0
3 years ago
Read 2 more answers
What is the first and last value of i to be displayed by the following code snippet? int n = 20; for (int i = 0; i &lt;= n; i++)
frutty [35]

Answer:

The first value of i is 0 and last value of i is 20.

Explanation:

The following are the description of a given loop.

  • In this problem, there are two loops one is the internal loop and the other is the external loop
  • In the outer loop, the value of " i" is initialized with "0" So the first value is printed 0 in the console.
  • For one value of "i" all the inner loop is executed.
  • The loop is executed is less equal to 20 that's why the last value of "i" is printed 20 in the console window.

6 0
3 years ago
which midi keyboard mode allows for one sound on one end of the keyboard and another on the other end
wlad13 [49]

Answer:

Sound button in the scratch

5 0
3 years ago
Other questions:
  • An authenticated user can add up to how many computer accounts to the domain, by default
    6·1 answer
  • “Green Technology” is also known as what?
    11·1 answer
  • Role-playing, action, educational, and simulations are examples of computer and video game _____. Windows and Apple offer_____ ,
    13·1 answer
  • #11. Write a program that prompts the user to input a four-digit positive integer. The program then outputs the digits of the nu
    6·1 answer
  • The person in charge of recording the sound should always
    15·1 answer
  • What food does swiss eat on christmas?
    10·1 answer
  • Run the browser checker to see that the computer you are using now is set up for WileyPLUS. Which of the following browser funct
    15·1 answer
  • Why does my inbox keep getting notifications and then disappearing?
    15·2 answers
  • How is primary storage different from secondary storage? Select the TWO correct statements. The CPU can only read and write data
    12·2 answers
  • Imagine that you are about to make a presentation during an online meeting, where people will need to be able to see you, and yo
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!