1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Archy [21]
3 years ago
12

Whate is function of northe bridge​

Computers and Technology
1 answer:
Scorpion4ik [409]3 years ago
3 0

Answer:

After this I'm officially a virtuoso

Explanation:

Sorry bout the spelling

You might be interested in
A large institution, such as a bank, may have thousands of transactions to process in which no user interaction is required; whi
White raven [17]

Answer:

Mainframe Computer System

Explanation:

Mainframe systems or simply mainframes are computers used for critical application, bulk processing and transaction processing.

They are larger than the basic computers we find around. They are advantageous as they are able to process large data faster. For this reason, large institutions like banks tend to use them for processing of data because of the thousands of transactions they engage in.

They are capable of handling and processing very large amount of data quickly.

Examples of other large institutions that uses mainframe computers apart from Bank stated in the question are

1. Stock brokerage firms

2. Government agencies

3. Insurance agencies

4. Fortune 500 companies and so on.

6 0
3 years ago
Read 2 more answers
A misfire code is a type _______ diagnostic trouble code (DTC).
Gre4nikov [31]

A misfire code is a type A diagnostic trouble code.  

A type A misfire indicates impending catalyst damage and is the most serious type of misfire condition. If this type of misfire is detected, the MIL may flash once per second to notify the driver that the car needs immediate service as soon as possible. In addition, a DTC is set and a freeze frame data is stored.


6 0
3 years ago
Which term describes an event where a person who does not have the required clearance or access caveats comes into possession of
notka56 [123]

Answer:

The answer is "compromise"

Explanation:

In computer science, the comprised system is used to describe as any technological resource, that has been negatively affected by an untrustworthy source for nondisclosure, integrity or accessibility either deliberately or inadvertently.

  • In this, the mechanical interaction from the unauthorized source or technological progress can result in compromise.
  • This helps you and the partner to meet each other's interests by taking into consideration both the positions and the solution to the main problem.

4 0
3 years ago
Read 2 more answers
Which of the following represent features of free software licensing? Check all of the boxes that apply.
Iteru [2.4K]

Answer: A :is concerned with defending users’ freedom of use

C:makes source code available for editing

Explanation:

7 0
3 years ago
We learned that an ideal multiple access protocol has FOUR desirable
Nataly [62]

Answer:

We learned that an ideal multiple access protocol has FOUR desirable

characteristics, describe them.

Explanation:

1.- Very experienced technology and easy to implement.

2.- Rigid resource management and unfit for variable traffic flows.

3.- Requires antenna duplexer for duplex transmission.

<u>Duplex</u> <em>is a term used in telecommunication to define a system that is capable of maintaining two-way communication, sending and receiving messages simultaneously. </em>

4.- Normally FDMA is combined with multiplexing FDD.

<u>FDMA</u> (acronym in English for Frequency Division Multiple Access) <em>is a multiplexing technique used in multiple communication protocols, both digital and analog, mainly radio frequency, and among them in mobile phones of GSM networks. </em>

<u>FDD</u> (Frequency Division Duplexing in English) <em>designates a duplex method in the environment of wireless telecommunications and over certain wired networks.</em>

4 0
3 years ago
Other questions:
  • If you have a 3D printer please show me a vid of you making something because I'm interested in getting one. Ty! Also can someon
    12·1 answer
  • An email address is made up of all of the following parts except
    13·2 answers
  • Effective presentations vary the color scheme on each slide.
    7·2 answers
  • N, or central processing unit, is also known as the
    10·2 answers
  • The memory unit of a computer has 2M Words of 32 bits (or 4 bytes) each. The computer has an instruction format with 4 fields: a
    14·1 answer
  • A relational database is different from a simple database because it has more than one _____.
    13·1 answer
  • Describe how catching exceptions can help with file errors. Write three Python examples that actually generate file errors on yo
    12·1 answer
  • A user reports that nothing happens when he or she attempts to print from the computer at his desk. This points to a possible pr
    15·1 answer
  • List any three importance of computer points​
    8·1 answer
  • Which of the following is an algorithm?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!