1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mrac [35]
3 years ago
14

The computer architecture is broken into these three components

Computers and Technology
1 answer:
GalinKa [24]3 years ago
7 0

Answer:

CPU, memory and input/output.

Explanation:

The computer architecture is broken into these three components;

I. CPU: this is known as the central processing unit and it is considered to be the brain of a computer system. It is the system unit where all of the processing and logical control of a computer system takes place.

II. Memory: it is the location used by the computer system to hold or store data. A computer memory comprises of random access memory (RAM) and read only memory (ROM).

III. Input/output: this unit is also known as peripherals and it comprises of all of the input and output devices that are interconnected with the CPU. It includes keyboards, speakers, monitor, printer, scanner etc.

You might be interested in
Can someone let me join your kingdom if anybody knows this game and plays it as well. ​
Assoli18 [71]

Answer:

sure is called voxetas

Explanation:

7 0
3 years ago
What is the most significant issue that needs to be addressed when ensuring the proper functioning of a computer?
ycow [4]

Answer:

The most significant issue addressed while ensuring the proper functionality of computer is the working of Operating System.

Explanation:

There are many issues faced while making the computer properly functional. Such as, Memory size, processor speed, software installation etc. while operating system not working properly can cause a significant problem. If operating system is not working properly, the user is unable to use the computer.

So, to make sure the functioning of computer, the significant issue that should be needed to address is Operating System Installation.

7 0
3 years ago
The roll out, roll in variant of swapping is used ____."
Sindrei [870]

Answer:

C.) for priority-based scheduling algorithms

Explanation:

for priority-based scheduling algorithms

4 0
3 years ago
Write a menu-based program in C++ for an input restricted dequeue using Linked List consist of
Natali5045456 [20]

Answer:

C++ With Examples

— Input-restricted Deque: In input-restricted, deletion can be done from ... getLast: Retrieves the last item in the queue. ... Now, we insert element 3 at the rear.

8 0
3 years ago
Visit the target Let Me Discover page and review the history of HTML. Also, search the internet for the history of the internet
Lyrx [107]

Whether you are a novice, hoping to delve into the world of web design or an experienced webmaster keen to improve your skills, we’ve got online tutorials tailored to your web design needs.


Our HTML For Absolute Beginners will turn you from wannabe to webmaster in just a few hours. Unlike many other HTML tutorials, it's a step-by-step guide – not a boring long-winded reference.


Our step-by-step guide teaches you the basics of HTML and how to build your first website. That means how to layout an HTML page, how to add text and images, how to add headings and text formatting, and how to use tables.

use this because that is cheating no offence

3 0
3 years ago
Other questions:
  • Checking the ___________ will reduce the possibility of having to rebuild or replace the engine.
    9·2 answers
  • 4. The NIMS Management Characteristic of Chain of Command and Unity of Command means that each person: A. Continues to report di
    9·1 answer
  • You are building a gaming computer and you want to install a dedicated graphics card that has a fast gpu and 1gb of memory onboa
    15·2 answers
  • Does anyone have the problem where you try to watch a video to get your answer but it brings up a thing asking your gender to ma
    6·1 answer
  • A ____________ would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a____________
    12·1 answer
  • What areas do you need to grow your knowledge in to understand your financial future?
    12·1 answer
  • Choose the correct term to complete the sentence.
    12·1 answer
  • How to shutdow computer
    7·1 answer
  • Write a Python program to find whether a given number (accept from the user) is positive
    11·1 answer
  • What power points feature will you use to apply motion effects to different objects of a slide
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!