1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Neko [114]
3 years ago
6

Which are the 2 main elements that’s make up computer architecture?

Computers and Technology
2 answers:
LiRa [457]3 years ago
4 0

Answer:

Computer architecture is made up of two main components the Instruction Set Architecture (ISA) and the RTL model for the CPU.

Explanation:

erik [133]3 years ago
4 0

Answer:

Explanation:

Computer architecture is made up of two main components the Instruction Set Architecture (ISA) and the RTL model for the CPU.

You might be interested in
A listing of all the methods that are in the execution chain when an exception is thrown is called a(n) ____.
wolverine [178]

A(n) stack trace is a list of all the steps that make up the performance chain when an exception is thrown.

<h3>What exactly is a stack trace?</h3>
  • A stack trace is a report of the active stack frames at a specific point in the execution of a program in computing (also known as a stack backtrace or stack traceback).
  • Memory is frequently dynamically allocated in two locations during program execution: the stack and the heap.
  • As implied by their names, memory is continually allocated on a stack but not on a heap.
  • This stack is known as the program's function call stack in order to distinguish it from the programming construct stack, which is another term for stack.
  • In terms of technology, after a memory block has been assigned

To learn more about stack trace, refer to:

brainly.com/question/15886149

#SPJ4

4 0
2 years ago
How do you send a word document email???
suter [353]

for a word document in an email, you open email and click on the paperclip, then go into your files and find the word document (save it first) then click on that and write the email and send it.
4 0
4 years ago
What is a foreign key? a security key to a database that stores foreign data a security key to a database located in another cou
Elis [28]

Answer: a field in a table that links it to other tables in a relational database

5 0
3 years ago
Read 2 more answers
Which of the following statements about BLE is not true? a. BLE has a two-way, push-pull communication capability b. BLE uses le
Veronika [31]

Answer:

Only Apple iPhones can use BLE

Explanation:

Bluetooth low energy is a wireless personal area network technology and it has all the features mention in the option aside from option C " Only Apple iPhones can use BLE". Because most Android phones running 4.4 and above also support same technology.  

8 0
3 years ago
3) How ash traditional technology and modern
Fynjy0 [20]

Answer:

While the developed world benefits from the modern explosion of technology, countries like Ethiopia continue to rely on their forefathers' methods for important daily tasks such as farming, cooling, and providing clean water. These activities are often physically challenging, time and energy intensive, and are often carried out by female family members in many such societies. Furthermore, they can damage the local ecology and climate, such as deforestation and soil erosion caused by the use of trees for firewood. Western technologies are often too complicated, expensive, unacceptable, and difficult to maintain in developing societies, so they are of little or no use in these situations.

4 0
3 years ago
Other questions:
  • 3 to the power x + 1 equal to 9 to the power 2x + 1​
    15·1 answer
  • 4. What aspect of the initial database planning process would the formula (0 + Pt × 3 + p)/5 be used in?
    5·1 answer
  • Search engines enable you to
    13·2 answers
  • Create a lottery game application. Generate three random numbers (see Appendix D for help in doing so), each between 0 and 9. Al
    14·1 answer
  • A company that wants to send data over the Internet has asked you to write a program that will encrypt it so that it may be tran
    6·1 answer
  • What's a listserver ?
    8·1 answer
  • A video streaming website uses 32-bit integers to count the number of times each video is played. in anticipation of some videos
    14·1 answer
  • Kamal plans to offer new, more favorable contracts to business customers who are now receiving a discount and use wireless servi
    7·1 answer
  • Click this link to view O*NET’s Work Styles section for Petroleum Engineers. Note that common work styles are listed toward the
    8·2 answers
  • Wi-Fi Protected Access (WPA) fixes critical vulnerabilities in the earlier wired equivalent privacy (WEP) standard. Understandin
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!