1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
UkoKoshka [18]
3 years ago
8

Which of these are part of the CPU? O peripheral O HDMI cord O core O keyboard

Computers and Technology
1 answer:
Makovka662 [10]3 years ago
7 0
Hiii I think the best option would be C. Core
You might be interested in
You '' friend or ''like'' a page o your favorite social media page that advertises a
Naddik [55]

Answer:

The correct answer for the given question is " yes".

Explanation:

In the above question the correct answer is yes because, in any social media site. If we like any web page.it will shows the name of person that like the web  pages .

For example: if we login in any social side  we will see various images,video and story etc.if any  user like all.  it will show the person name that is liked by them.

So the correct answer for this question is yes.

5 0
3 years ago
Help me decide this hurry
Triss [41]

Answer:

plus 5

Explanation:

7 0
3 years ago
Discovery of a vulnerability in a software program can potentially be sold to the government. Group of answer choices True False
enyata [817]

Discovery of any vulnerability in a software program can potentially be sold to the government: True.

<h3>What is vulnerability?</h3>

Vulnerability is any form of weakness, flaw or defect that is found in a software application, computer system, or network, which can be exploited by an attacker (hacker), in order to gain an unauthorized access and privileges to sensitive user data that are stored in a computer system.

This ultimately implies that, a vulnerability in a software application can potentially be sold to the government, so as to avert and mitigate any form of unauthorized access and privileges to sensitive user data.

Read more on vulnerability here: brainly.com/question/25813524

#SPJ1

4 0
2 years ago
If you think a query is misspelled, which of the following should you do?
MrMuchimi

Answer:

Check the explanation

Explanation:

When there are situations of obviously misspelled queries, you will have to base the Needs Met rating on the user intent

The reason is that, even when query is misspelled it won’t mean that it is less important. Therefore, the queries should be assigned degree of rating based on the respective priority.

8 0
3 years ago
Alex has composed a layout with this Image for a magazine. Which rule of composition has Alex applied?
Genrish500 [490]

Answer:

Golden Ratio

Explanation:

7 0
3 years ago
Other questions:
  • What do radio telescopes use to gather and focus radio waves?
    14·2 answers
  • For which task is the WordArt gallery most useful?
    15·2 answers
  • Text messaging is an example of nonverbal communication. Please select the best answer from the choices provided. T F
    7·2 answers
  • The practice of using similar but not identical domain names is called _____. domain spoofing domain masquerading domain tasting
    13·1 answer
  • Write down the steps that you will take to organize your files
    12·2 answers
  • Monica spent a lot of time preparing for her interview, but the hiring manager is not asking any of the questions she practiced.
    9·2 answers
  • REPORT THIS USER. HE'S SHOWING HIS YK WHAT TO EVERYONE INCLUDING ME. HIS ACCOUNT PROFILE IS IN THE PICTURE BELOW
    14·1 answer
  • How do you access the <br><br>internet in your school and at home?​
    11·1 answer
  • A(n) _____ is a data validation rule that should be applied to mandatory data items.
    15·1 answer
  • A parent process calling _____ system call will be suspended until children processes terminate.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!