1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fudgin [204]
3 years ago
12

Computing devices translate digital to analog information in order to process the information

Computers and Technology
1 answer:
tester [92]3 years ago
5 0

Complete Question:

Which of the following about computers is NOT true?

Group of answer choices.

A. Computing devices translate digital to analog information in order to process the information.

B. Computing devices are electronic.

C. The CPU processes commands.

D. The memory uses binary numbers

Answer:

A. Computing devices translate digital to analog information in order to process the information.

Explanation:

Computing is the process of using computer hardware and software to manage, process and transmit data in order to complete a goal-oriented task.

The true statements about computers are;

I. Computing devices are electronic: the components and parts which makes up a computer system are mainly powered by a power supply unit and motherboard that typically comprises of electronic components such as capacitors, resistors, diodes etc.

II. The CPU processes commands: the central processing unit (CPU) is responsible for converting or transforming the data from an input device into a usable format and sent to the output device.

III. The memory uses binary numbers: computer only understand ones and zeros.

You might be interested in
Enzo is writing a paper about the similarities and differences between ancient Rome and modern America. Which text structure is
GenaCL600 [577]

Answer:

The correct answer is <em><u>B.) comparison and contrast</u></em>

Explanation:

just did the unit test review. you are welcome

4 0
3 years ago
Read 2 more answers
A threat analyst is asked about malicious code indicators. Which indicator allows the threat actor's backdoor to restart if the
joja [24]

Indicators of compromise enable system administrators and information security professionals to detect intrusion attempts or malicious activities.

Your information is incomplete as the options aren't provided. Therefore, an overview of indicators of compromise will be given.

Indicators of compromise means the pieces of forensic data that are found in files or system log entries to identify malicious activity on a network or system.

Indicators of compromise help IT and information security professionals to detect malware infections, data breaches, etc. Examples of indicators of <em>compromise</em> include log-in red flags, unusual outbound network traffic.

Read related link on:

brainly.com/question/25522987

8 0
3 years ago
What name is given to the method used to copy a file onto a CD
Romashka-Z-Leto [24]

Answer: Burn or Write

Explanation:

Burn is a colloquial term meaning to write content to a CD , DVD , or other recordable disc. DVD and CD drives with recording capabilities (sometimes called DVD or CD burner s) etch data onto the disks with a laser .

4 0
3 years ago
Select the statements below that correctly match the meaning of the letter in the concept of developing SMART goals?
fenix001 [56]

Specific, Measurable, Attainable, Relevant and Timely.

6 0
3 years ago
Which of the following plug-ins was developed by microsoft and is a software development tool used to write and run internet app
Elodia [21]
I'm not a hundred percent sure but maybe silverlight?
5 0
3 years ago
Other questions:
  • how do you make a circuit so 1 switch will turn on/off all the lights(3 lights) and a second switch will change the lights from
    14·2 answers
  • Write a script which: Uses the input function to get any number and store it in a variable named my_number Create a new variable
    8·1 answer
  • Why do most laptops have LCD rather than OLED displays, which are found on mobile devices?
    9·1 answer
  • "PindCart, an online retailer, places a small file on the computer hard drive of its visitors to recognize them when they revisi
    7·1 answer
  • . double x = 5; declares that x is a...............variable.
    14·1 answer
  • ____ is the most widely used language for writing system software because it combines the power of a high-level language with th
    12·1 answer
  • You are asked to monitor a network which has a network monitoring system. Using the monitoring server, you notice that it is lis
    13·1 answer
  • 1. What is hydrolics?​
    6·1 answer
  • Name:
    13·1 answer
  • Data security issues that must be addressed by hipaa implementation teams include:__________
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!