1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mazyrski [523]
3 years ago
12

The ISA standard buses are used to connect​

Computers and Technology
1 answer:
soldier1979 [14.2K]3 years ago
5 0

Answer:

The ISA standard buses are used to connect Hard disk and Processor

Hope this helps you. Do mark me as brainlist

You might be interested in
file Assume that a prototype of the part above was built from several cubes. The total volume of the part is 0.54675 in.3. What
Rina8888 [55]
The correct answer is D
5 0
3 years ago
Describe one type of technology that is useful in producing images from space.
marta [7]
One technology is the telescope
8 0
3 years ago
What is the result of expression 15 > 10 > 5 in C? What is the result of the same expression in Java?
Inessa05 [86]

Answer:

java: error

C: false

Explanation:

In Java the compiler understand that you are trying to compare an integer (15) with a boolean (10 > 5) this generate the next error:

error: bad operand types for binary operator  

In C the compiler convert (15 > 10 > 5) in (15>10) > (10>5) which is equal to TRUE > TRUE, the compiler can also read it as 1 > 1 (since 1 is TRUE and 0 is FALSE).  like 1>1 is false then C program return false.

5 0
3 years ago
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email f
vodomira [7]

Answer:

Phishing.

Explanation:

Networks and computer systems in a network are susceptible to cyber attacks. A cyber attack is a networking term that describes a situation where a network is penetrated by a malicious process or program induced by an attacker or attackers.

A cyber attacker's sole intention is to steal information needed to achieve a malicious and devastating action to a client's personal assets. An example of such attacks is phishing.

Phishing is an attack that collects client's personal information at an imposter website after receiving an email from a person masquerading as an employee from a bank.

5 0
4 years ago
Convert decimal number 126.375 to binary (3 bits after binary point)
nevsk [136]

Answer:

126.375 in binary is: 1111110.011

Explanation:

In order to convert a decimal number to binary number system, the integral part is converted using the division and remainder method while the fractional part is multiplied with 2 and the integral part of answer is noted down. The fractional part is again multiplied with 2 and so on.

For 126.375

2         126

2          63 - 0

2          31 - 1

2          15 - 1

2            7 - 1

2            3 - 1

              1 - 1

So, 126 = 1111110

For 0.375

0.375 * 2 = 0.75

0.75 * 2 = 1.5

0.5 * 2 = 1.0

As we had to only find 3 digits after binary point, so

0.375 = 011

So 126.375 in binary is: 1111110.011 ..

8 0
3 years ago
Other questions:
  • How can you recognize an unsecured wireless network?
    9·1 answer
  • You have just plugged a USB portable hard drive into an older laptop and the disk has not appeared as available. You are concern
    11·1 answer
  • Do you watch markiplier?
    13·2 answers
  • The time delay of a long-distance call can be determined by multiplying a small fixed constant by the number of communication li
    8·1 answer
  • Instructions (software) that allow a computer (hardware) to be used are written using specific symbols, letters and numbers know
    7·1 answer
  • Advantages of desktop publishing over traditional methods include       
    11·1 answer
  • Which of the following is a correctly named cell?<br> B8<br> BB-8<br> 8-B<br> 8B
    11·1 answer
  • What is humanity’s greatest invention?
    13·1 answer
  • Discuss the information justify with two examples<br>​
    11·1 answer
  • A social service agency hires accenture to improve training and experiences for caseworkers. What is one way accenture can use v
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!