1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GarryVolchara [31]
3 years ago
15

The physical parts of Computer are kwon as​

Computers and Technology
1 answer:
Anna35 [415]3 years ago
3 0

Answer:

Computer hardware

Explanation:

Computer hardware includes the physical parts of a computer, such as the case,central processing unit (CPU), monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers and motherboard.

You might be interested in
This decision control structure enables the program to execute a statement or block of codes if and only if the Boolean expressi
eduard

Answer:

Both if-then and switch is the decision control structure that enables the program to execute a statement or block of codes

Explanation:

This decision control structure always checks for one or more condition and execute true statement “if the condition is true” otherwise it will execute false statement (if present). The “true statement” is compulsory.

In case of “if-then loop”, it executes the true block only if the Boolean expression is true. In a similar way in switch-case, the same happens and instead of else part there will be a “default” statement which is compulsory to be present and it will get executed.

8 0
3 years ago
In Asch’s study which of these lowered conformity rates
skad [1K]

Answer:

D. all of these are correct

Explanation:

option d is correct answer

3 0
3 years ago
Read 2 more answers
Ann. An employee in the payroll department, has contacted the help desk citing multiple issues with her device, including: Slow
coldgirl [10]

Answer:

d. Backdoor

Explanation:

A backdoor is a type of malware that overrides security checks and authentications to access a computer or embedded device.

When this is done, remote access is granted and databases and servers can be accessed and modified. Attackers can also give remote commands to the system.

What happened to Ann in the payroll department is probably a backdoor attack that affected her device.

8 0
3 years ago
When an event occurs, the agent logs details regarding the event. what is this event called?
Nimfa-mama [501]

If an event occurs, the agent logs details regarding the event. what is this event called GET.

The information in the agent log file is known to be the beginning of the log file, which is stated to show the agent's launch and handling of the services and configuration settings.

Keep in mind that the agent log also contains a history of the activities performed by the agent during runtime, along with any errors, and that it is utilised to investigate deployment issues.

As a result, if an event happens, the agent logs information about it. What is this GET event, exactly?

The agent monitoring services' startup and configuration settings are displayed at the log file's beginning. The sequence of agent runtime activity and any observed exceptions are also included in the agent log.

Learn more about agent logs:

brainly.com/question/28557574

#SPJ4

8 0
1 year ago
What is another name for “low-angle lighting”?
lys-0071 [83]
<span>another name for “low-angle lighting” is "</span>under-lighting"
4 0
3 years ago
Other questions:
  • Why is it best to run antivirus scans when the computer isn't being utilized?
    7·1 answer
  • To track website behavior data with google analytics, which steps will you need to complete?
    14·1 answer
  • ____ are systems in which queues of objects are waiting to be served by various servers
    5·1 answer
  • What is a thesaurus is best used for​
    11·2 answers
  • Choose the list of the best uses for word processing software.
    5·1 answer
  • 4.3 Code Practice<br> edhisve
    13·1 answer
  • Kesley has been hired to set up a network for a large business with ten employees. Which of the factors below will be
    9·1 answer
  • A group of students writes their names and unique student ID numbers on sheets of paper. The sheets are then randomly placed in
    15·1 answer
  • What is the purpose of each component ?
    6·1 answer
  • Which cyber protection condition establishes a protection.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!