1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrey2020 [161]
3 years ago
6

Mention 3 components that can be found at the back and front of the system unit​

Computers and Technology
1 answer:
Radda [10]3 years ago
3 0

Answer:

<u>Back</u>

Power port, USB port, Game port

<u>Front</u>

Power button, USB port, Audio outlet

Explanation:

There are several components that can be found on the system unit.

In most (if not all) computer system units, you will find more component at the back side than the front side.

Some of the components that can be found at the back are:

Ports for peripherals such as the keyboard, mouse, monitor, USB ports, power port, etc.

Some of the components that can be found at the back are:

The power button, cd rom, audio usb ports, several audio outlets, video port, parallel ports, etc.

Note that there are more components on the system units. The listed ones are just a fraction of the whole components

You might be interested in
Choose a simple way to let a VPN into your VPC continue to work in spite of routing changes.
Slav-nsk [51]

Answer:

Through cloud router

4 0
3 years ago
In the ______ algorithm, the disk arm starts at one end of the disk and moves toward the other end, servicing requests till the
Ahat [919]

Answer:

elevator , SCAN

Explanation:

In the elevator algorithm, the disk arm starts at one end of the disk and moves toward the other end, servicing requests till the other end of the disk. At the other end, the direction is reversed and servicing continues. SCAN

8 0
3 years ago
1. What are the biggest password mistakes that people and companies make? How can you avoid those mistakes?
Ghella [55]

Answer:

1. Keeping a password with user name or password is very easy word.

2. Passwords should be kept strong so that it cannot be haccked. One should use upper case letters along with lower case letters and numeric and special characters to make the password strong.

3. The businesses usually run anti viruses in case of virus attack. In case of haccker attack businesses are temporarily shut down from their routine work and alternate business plan is activated which runs the business activities incognito version.

4. High profile passwords can be leaked as it is on the computer system which can be accessed from around the world.  

Explanation:

The businesses should use DRP system in order to avoid complete shut down of business operations in case of a cyber attack. The passwords should be kept strong enough so that no one can crack the password and all employees should not be given complete access to business operations and planning activities. Employees access should be restricted to their job role.

5 0
3 years ago
What is a statement that runs only under counting conditions?
IRINA_888 [86]

Answer:

An if statement

Explanation:

An if statement runs provided the logical requirement is satisfied.

7 0
3 years ago
What company or individual is responsible for developing the linux operating system?
Arisa [49]
The guy is Linus Torvalds.,
If this was helpful, please mark me as brainliest.
3 0
4 years ago
Other questions:
  • Suggest how the following requirements might be rewritten in a quantitative way. You may use any metrics you like to express the
    7·1 answer
  • Los antivirus no son infalibles y en ocasiones pueden darnos :
    10·1 answer
  • Java
    13·1 answer
  • A four year old laptop will not boot and presents error messages on the screen
    8·1 answer
  • The political spectrum spans from Communism on the extreme left to __________ on the extreme right. /8178757/1f6bdbf3?utm_source
    6·2 answers
  • Helping people keep track on things is the purpose of_____ A database B table C query D form​
    12·1 answer
  • Which of these shortcuts becomes available only when text is highlighted?
    10·1 answer
  • 6.13: Word Count
    15·1 answer
  • The private field, which is known as the property‘s __________, holds any data that is assigned to the property.a. private datab.
    9·1 answer
  • In order to restrict editing to a document, a user will go to Review, , Restrict Editing, and will then select what kinds of edi
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!