1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serhud [2]
3 years ago
14

Describe 3 internal computer hardware apart from RAM and ROM

Computers and Technology
2 answers:
LekaFEV [45]3 years ago
6 0
1. CPU
2. Motherboard
3. Fan
lora16 [44]3 years ago
5 0

Answer:

1cpu

2motherboard

3fan

You might be interested in
Leonardo is having difficulty accessing the course website. he should contact the for assistance. (points:1)
Alona [7]
He should contact the teacher for assistance
3 0
3 years ago
CRM systems provide an organization with an important element: all employees of the company who directly or indirectly serve a c
Vilka [71]

Answer: On the same page

Explanation:

 The CRM is basically stand for the customer relationship management that are design to support all the relationship with the customers. It basically analysis the data about the customers to improve the relationship and growth in the organization.

All the employees in the organization are directly and indirectly server the customers are basically o the Same page by the individual computers.

The CRM approach are basically compile the given data from the different communication source such as company website, email and telephone.

 

8 0
4 years ago
The programmer's job can be broken down into five development steps true or false
wariber [46]
True 
1 clarify programing needs
2 design the program
3 code the program 
4 test the program
5 document and maintain
5 0
3 years ago
Questions: 1) Run the C program, attach a screenshot of the output in the answer sheet. 2) Check the address of the array and th
KiRa [710]

Answer:

Output

mumners = 0x7ffc4d2767d0

Method1: Address of array Elements

numbers[0] = 0x7ffc4d2767d0

numbers[1] = 0x7ffc4d2767d4

numbers[2] = 0x7ffc4d2767d8

numbers[3] = 0x7ffc4d2767dc

numbers[4] = 0x7ffc4d2767e0

Method2: Address of array Elements

numbers[0] = 0x7ffc4d2767d0

numbers[1] = 0x7ffc4d2767e4

numbers[2] = 0x7ffc4d2767f8

numbers[3] = 0x7ffc4d27680c

numbers[4] = 0x7ffc4d276820

sizeof(numbers) = 20

2.

mumners = 0x7ffc4d2767d0

Method1: Address of array Elements

numbers[0] = 0x7ffc4d2767d0

Yes both are same since address of the array is the address of its first element

3.

Method1: Address of array Elements

numbers[0] = 0x7ffc4d2767d0

numbers[1] = 0x7ffc4d2767d4

numbers[2] = 0x7ffc4d2767d8

numbers[3] = 0x7ffc4d2767dc

numbers[4] = 0x7ffc4d2767e0

Method2: Address of array Elements

numbers[0] = 0x7ffc4d2767d0

numbers[1] = 0x7ffc4d2767e4

numbers[2] = 0x7ffc4d2767f8

numbers[3] = 0x7ffc4d27680c

numbers[4] = 0x7ffc4d276820

Address printed using Method1 and Method2 are same since name of the array itself a pointer and adding 1 to it gives second element address and 2 to it gives third element and so on similarly applying address operator over the array elements provides the direct address of the element.

4.

printf("Length(numbers) = %lu\n",sizeof(numbers)/sizeof(numbers[0]));

Dividing an size of array by size of individual array elements gives length of an array

Length(numbers) = 5

5.

Yes even if numbers are passed to a function sizeof can be applied since numbers is starting address of an array and to pass an array as argument its address passed.

5 0
3 years ago
What is a commonly publicized password sql injection string?
aleksley [76]
The strings "or 1=1" and ""or ''=''"  can be commonly used to trick an SQL WHERE clause into becoming true.

So if you specify <span>' or ''=' as a password, you can log in if the query string would be:

</span><span>select username,pass from users where username='you' and password='' or ''='<span>' limit 0,1;</span></span>
7 0
4 years ago
Other questions:
  • Sam wants to move across the text in his documents to add data at predefined stops. Which key will he use to navigate through th
    13·2 answers
  • What can be done to improve the security of business uses of the Internet? Give several examples of ecurity measures and technol
    9·1 answer
  • Your boss wants you to set up an authentication scheme in which employees will use smart cards to log in to the company network.
    15·1 answer
  • Does artificial intelligence have a place in our society why or why not
    5·2 answers
  • In most programming languages, the compiler carries a preprocessing step to determine if certain statements will compile. For in
    7·1 answer
  • How does porter’s competitive forces model help companies develop competitive strategies using information systems?
    13·1 answer
  • What are the purposes of using a text-to-speech tool? Check all that apply.
    9·2 answers
  • What is binary ????????
    5·2 answers
  • Un polímero sintético es renovable o no renovable
    11·1 answer
  • if you want to build a smart-glove that responds based on the direction and speed a user moves their hand, what sensor should yo
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!