1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NeTakaya
3 years ago
8

Identity any five system unit components and explain the use for each [apart from processor]​

Computers and Technology
1 answer:
saw5 [17]3 years ago
8 0

Answer:

RAM

ROM

PROCESSOR

MOTHER BOARD

HARD DISK

Explanation:

Random access memory or RAM store data temporary

Read only memory or ROM permanently store data and have a programming needed to start (PCs) or other electronic device

CPU or processor refers to brain of computer

Mother board the main internal hardware component of system unit

Hard disk is electro mechanical data storage

You might be interested in
Madison works for Google as an Ethical Hacker. Madison main job responsibility is
Ivenika [448]

Answer:

to evaluate the security and identify vulnerabilities of a business

Explanation:

Madison is an ethical hacker (white hat hacker), meaning she is hired by companies to make sure that "evil" hackers (black hat hackers) can't hack into their websites.

7 0
3 years ago
Read 2 more answers
"It's inventiveness ,uncertainty and futuristic ideas,typically deals with science and technology,,what is it called??
Novosadov [1.4K]

<em>Answer:</em>

<em>It is because inventiveness is risky. It disrupt the established social contract, in the same way that invasive species do in natural ecosystems. Inventors best practice to protect themselves from angry response is to include in its marketing campaigns, the costly credibility of science support, the power of technology, the propaganda machine of the government, and the imagination of those in the science-fiction writing business. With a few bucks well spent —the most ridiculous, unnecessary and toxic invention could be a success in the marketplace. </em>

5 0
3 years ago
The sticky notes often have strings of characters written on them that appear to be passwords. What can you do to prevent the se
Varvara68 [4.7K]
Educate the user on how to make strong passwords
8 0
2 years ago
Which of the following best explains the different between Cut and Copy? a. When you copy text you are permanently deleting it,
Vilka [71]
B. When you copy text it remains in its original location and places it on the clipboard. Cutting text removes it from its original location and places it on the clipboard

5 0
3 years ago
Read 2 more answers
Mainframe computers have several CPUs, have very fast processor speeds, can supporting multiple operating systems and have huge
Marrrta [24]

Answer:

True.

Explanation:

Mainframe computers were developed and introduced in the early 1950s.

Mainframe computers have several CPUs, have very fast processor speeds, can supporting multiple operating systems and have huge amounts of storage capacity. As a result, mainframe computers are mostly or commonly used by large companies, business firms or governmental institutions for performing various complex tasks such as census, financial transactions, e-commerce, data sequencing, enterprise resource planning, etc.

7 0
3 years ago
Other questions:
  • What is the definition of an extinct species?
    8·2 answers
  • The first electronic networking technology widely used in the United States was the:
    6·1 answer
  • The term Electronic Privacy Information Center (EPIC) refers to a form of the digital subscriber line technology, which enables
    6·1 answer
  • A security utility program that scans the system for small programs that interfere with how a computer functions are _____ utili
    13·1 answer
  • Which access modifier is not allowed in a struct? Private Public Protected Internal All of the Above None of the Above A block {
    11·1 answer
  • Guys help me, to get 25 examples of computer software​
    8·1 answer
  • Two character strings may have many common substrings. Substrings are required to be contiguous in the original string. For exam
    7·1 answer
  • A processor's speed is measured in megahertz (MHz), or millions of instructions per second; and gigahertz (GHz), or billions of
    9·2 answers
  • Which protocol makes a connection, checks whether the data is received, and resends it if it is not?
    12·1 answer
  • 4. Return the card number, first name, last name, and average late fee of each customer. Name this column as "Fee".
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!