1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetlanka [38]
3 years ago
5

What is the main function of processing unit​

Computers and Technology
2 answers:
Nataliya [291]3 years ago
5 0

Answer:

CPU

Explanation:

CPU is considered as the brain of the computer. CPU performs all types of data processing operations. It stores data, intermediate results, and instructions (program). It controls the operation of all parts of the computer.

sattari [20]3 years ago
3 0

Answer:

CPU is considered as the brain of the computer. CPU performs all types of data processing operations. It stores data, intermediate results, and instructions (program). It controls the operation of all parts of the computer.

Explanation:

You might be interested in
In order to make schemas that will appear in the Schema Library available in the XML Options dialog box, what file extension sho
Luba_88 [7]

Answer:

You can use your XML parser

Explanation:

hope this helps!

5 0
3 years ago
Start
Crank

Answer:

N=5  key task decision start and end

Explanation:

8 0
3 years ago
Jared makes two copies of an antivirus software package he just bought and sells one of the copies to Joshua. In this scenario,
sladkih [1.3K]

Answer: d) Illegal and unethical

Explanation:  Illegal term is used for the something that is incorrect according to regulation.The legal factor is not present in this type of activity and thus it is judged by the regulations as unauthorized act and can be concluded as act of crime .

Unethical term defines that something is incorrect in a moral way and the person doing the unethical activity lacks the principles in his/her nature.

Jared is also performing illegal act by selling the piracy  antivirus package of software .The act is unethical as well because Jared is lacking the basic morals e.g.-stealing is offensive and incorrect act.Thus the correct option is option(d).

Other options are incorrect because the  act done by Jared is against the conduct which is not legal and ethics are moral features which is not present in Jared's act.

5 0
3 years ago
Your laptop LCD panel is blank when you boot up. You can hear the laptop turn on, and the keyboard backlight is on. You have che
kati45 [8]

Answer:

Plug the laptop to a desktop monitor.

Explanation:

Assuming that the damaged component its the LCD screen and nothing else, the laptop would still be able to work correctly when connected to a desktop monitor, with an HDMI, or VGA cable. Thus you will find out that you only need to replace the screen and your graphic processor and other components are functional. Also if you need to work with your laptop and can't wait for the replacement, you can do still do it. Your keyboard and mouse are still functional, so you will see and work on your desktop monitor.

8 0
3 years ago
A(n) ____ address is an assigned series of numbers, separated by periods, that designate an address on the Internet.
schepotkina [342]

Answer: An <em>IP</em> address is commonly referred to as an accredited series of numbers, disjointed by periods, this eventually provides an address on web. In laymen terms, an IP address is commonly known as a numerical label accredited to a device that is connected to a network which uses the IP for communication.

6 0
3 years ago
Other questions:
  • Which sentence in the passage conveys the message that drones can be used in the study of history?
    11·2 answers
  • The ____ layer of the osi model performs a series of miscellaneous functions necessary for presenting the data package properly
    6·1 answer
  • True or False. A modern programming EXE provides a text editor, a file manager, a compiler, a linker and loader, and tools for d
    9·1 answer
  • My internet works but my router won't let any devices connect to it unless you use a cat. 5 cable :\
    12·1 answer
  • Which methods will remove filters? Check all that apply.
    6·2 answers
  • Give two reasons why it is not advisable to open email from unknown sources​
    13·2 answers
  • Select the correct answer.
    11·2 answers
  • What action should you take if you become aware that sensitive compartmented information has been compromised
    14·1 answer
  • A blueprint or a "print" needs to
    9·1 answer
  • declaring a member as in the base class provides access to that member in the derived classes but not to anyone else.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!