1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DanielleElmas [232]
3 years ago
11

Which component of cpu controls the overall operation of computer..​

Computers and Technology
1 answer:
arsen [322]3 years ago
4 0

Answer:

Control Unit.

Explanation:

The component of CPU that controls the overall operation of computer is control unit.

The control unit, also known as CU, is one of the main component of the Central Processing Unit (CPU). The function of CU is to fetch and instruct computer's logic unit, memory, input and output device. The CU receives information which it turns into signals. Thus controlling the overall operations of computer.

Therefore, control unit is the correct answer.

You might be interested in
What is a teaser and what is an audience
Taya2010 [7]
Teaser - Only showing a part of a clip or something to hook to audience 
Audience - The ones watching or viewing 
6 0
3 years ago
Sigma Technology is a company based in Singapore, with branches in 24 countries. It needs multiple CAs in different locations to
seropon [69]

PKI trust model that should be used, is a distributed trust model.

  • A distributed trust is a trust model that gives power to different source while taking the power away from a single source and thereafter, shares that responsibility to the wide range of sources. It is important as it allows trust to flows through network, marketplaces and forums.

  • With the use of this distributed trust model, Sigma Technology can have multiple CAs in different locations to work on behalf of the company. And even if one is absence, other CAs can still issue certificate without any hindrances.

Conclusively, we can say that PKI trust model that should be used is a distributed trust model.

Learn more from:

brainly.com/question/14837773

8 0
3 years ago
1. Identify one modern technology and discuss its development and discuss what future changes might occur that could have an eve
Mnenie [13.5K]

Explanation:

1- The cell phone is a modern technology that has been developing and gaining new features in addition to being just a device for making phone calls. Currently cell phones perform the same tasks as computers, making it possible to exchange information from the internet, share media, etc.

The development of smartphones will still be significant and will impact even more on the lives of all users, as an essential device for communication at work, and through software developed for cell phones that facilitate human life, such as through the possibility of making purchases , order a taxi, carry out bank transactions, etc.

2- A management information system is a technology aimed at organizations, in order to assist a manager in the decision-making process.

An MIS is an intelligent system that uses a large volume of data and information to generate information and solutions so that a manager has a greater chance of analyzing a scenario in the organization, and makes a more effective decision for the company.

The system is derived from procedures and interaction between people, which generates constant learning and improvement focused on organizational decisions.

MIS was created to assist current organizational management, whose processes derive from a large amount of data and information, in addition to the high competitiveness in the market, which requires decisions to be made quickly, effectively and at the lowest cost.

3- The cell phone and the computer are examples of polypotent technologies, that is, those that are used for purposes greater than those for which they were created, for example, the computer was created to compute data, and the cell phone to make telephone calls, but currently perform functions of being media sharing, communication and leisure equipment.

5 0
3 years ago
Briefly describe the concept of network topology change and explain how these can be dealt with using Routing Information Protoc
Natasha2012 [34]

Answer: network topology is the arrangement of nodes which includes routers and switches so that enables connection between the server and the client.

however due to times when there is huge traffic in the nodes there needs to be an optimal path for the exchange of information which is accomplished by different routing protocols.

Explanation:

Routing Information Protocol(RIP) is one such protocol which enables to route packets from the source to the destination having the least possible traffic along its path. There are two sets of routing algorithm which are

1. Static routing protocols

2. Dynamic routing protocols.

The difference between the two is that dynamic routing protocols helps to construct the routing tables dynamically as compared to static routing.

RIP is a type of dynamic routing whereby it sends the contents of its routing table the adjacent routers every 30 seconds and whenever a route is discarded from the routing table it is marked as unusable.

RIp is supported by almost all routers and also supports load balancing which is one of it advantages.

8 0
3 years ago
Write, compile, and test a program named PersonalInfo that displays a person’s name, birthdate, work phone number, and cell phon
djverab [1.8K]

Answer:

A very simple C program is as follows:

#include <stdio.h>  // for input output functions

int main()  

 {

    printf("Name : John\n");   //display name

    printf("Date of Birth : 05/02/1993\n");  //displays DOB

    printf("Mobile Number: 98-7654321\n");  //displays mobile number

  }    

Explanation:

Now if you want to take name, date of birth and number from user as input then you can use the following code:

#include <iostream> // for input output functions

using namespace std; // to identify objects like cin cout

/* The function named PersonalInfo that takes input from user and displays name, mobile number and data of birth on output screen */

void PersonalInfo(char name[],char birthdate[], char number[]){

//prompts user to enter name

cout<<"Please enter your name: "<<endl;

cin>>name; //stores name entered by the user

//prompts user to enter his dob in the format given in the bracket

cout<<"Please enter your birthdate (dd/mm/yyyy): "<<endl;

cin>>birthdate; //stores dob entered by the user

//prompts user to enter his mobile number in the given format

cout<<"Please enter your mobile number (xx-xxx-xxxxxxx): "<<endl;

cin>>number; //holds the digits entered by the user

cout<<"Your name is: "<<name<<endl; //displays name

cout<<"Your birthdate is:"<< birthdate<<endl; //displays date of birth

cout<<"Your mobile number is: "<<number<<endl; } //displays number

int main() //start of main() function body

{   char username[30],dob[30],phone[30];

/*three char type arrays that contain name of user in username, date of birth in dob and phone number in phone array */

   PersonalInfo(username,dob,phone);  } //calls function PersonalInfo()

Output:

Please enter your name: John

Please enter your birthdate (dd/mm/yyyy): 09/05/1993

Please enter your mobile number (xx-xxx-xxxxxxx): 91-123-4567890

Your name is: John

Your birthdate is: 09/05/1993

Your mobile number is: 91-123-4567890

7 0
3 years ago
Other questions:
  • ____________________ memory is the ability to add RAM without shutting down the computer or operating system.
    13·1 answer
  • Dfd symbols are referenced by using all ____ letters for the symbol name.
    9·1 answer
  • Jacob is a website designer. Whenever his company takes on a new project, Jacob takes the initiative and comes up with ideas and
    12·1 answer
  • Which was the first media-sharing website that allowed users to submit their own work on the site?
    7·1 answer
  • How can you have a safe browsing experience
    5·1 answer
  • Think back over the information presented in the lesson about how you can skillfully use the Internet when doing research. Selec
    14·1 answer
  • 10. Question
    15·1 answer
  • Alison is having a hard time at work because her Inbox is flooded with emails every day. Some of these emails are unsolicited. S
    15·2 answers
  • The Monte Carlo method is commonly used to approximate areas or volumes of shapes. In this problem, we will use Monte Carlo to f
    12·1 answer
  • When you try to move the desktop icon using the click and drag method and it doesn't move, what is the reason?​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!