1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mandarinka [93]
3 years ago
11

The physical parts or componests of a computer system is called

Computers and Technology
1 answer:
Evgesh-ka [11]3 years ago
6 0

Answer:

The answer that your looking for is computer hardware.

Explanation:

You might be interested in
What is the purpose of extent in lines in engineering drawing
Blizzard [7]

Answer:

Extension lines are used to indicate the extension of a surface or point to a location preferably outside the part outline.

Explanation:

7 0
3 years ago
When date is processed into a meaningful form, i becomes _______.
mrs_skeptik [129]

Answer:

When date is processed into a meaningful form, it becomes information.

6 0
3 years ago
What qualities in an employee are highly desired by employers?
slava [35]
Flexibility and open-mindedness
being quick to adapt to technology changes
having a positive attitude
taking initiative to solve problems
5 0
3 years ago
Read 2 more answers
A business-to-consumer (B2C) website tracks the items you place in a shopping cart using _____. Group of answer choices the Tran
steposvetlana [31]

Answer:

The answer is "cookies".

Explanation:

The B2C websites refer to companies, that directly sell services and products without the need for a distributor. It refers to the online merchants, which provide the offer on the products and services via the internet to customers.  It uses the cookie in a small amount of data within the browser memory for the process and once you visit those websites on the internet, OS transfer cookies for your internet browser. It includes an ID as well as its URL, and the incorrect choice can be defined as follows:

  • The TLS protocol is the wrong choice because it is used in the privacy and data security.
  • The crawlers are also a wrong choice because it is used in automatically searches.
  • An electronic wallet is used to store your money, that's why it is wrong.
7 0
4 years ago
Why must you be careful when handling a hard drive?
Nikitich [7]
You must be careful while handling a hard drive because If you’re not careful with it the hard drive may corrupt or crash.
7 0
4 years ago
Other questions:
  • What machine is considered by many to be the first all-programmable electronic digital computer?
    15·1 answer
  • __________ is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information, suc
    5·1 answer
  • When you select a state abbreviation from a combo box, how does the form control record your selection?
    8·1 answer
  • What is an input periphal
    8·2 answers
  • How do I delete my brainly account?<br> I don't need anymore.
    13·2 answers
  • 71 81 77 15 63 96 36 51 77 18 17
    14·1 answer
  • Consider a Dog class and a Mammal class. Which is true? Group of answer choices The Dog class is abstract The Mammal class is co
    10·1 answer
  • You are going to visit a national park, and have never been there before. You are using a map to try and make the distance trave
    11·1 answer
  • Cheng, a student, is researching a company's profile on a professional networking website. In what way will this kind of researc
    13·1 answer
  • What are the two broad categories that individual definitional techniques fall under? Check all that apply. Demonstrative defini
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!