1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olga nikolaevna [1]
2 years ago
13

Explain basic anatomy of computers.

Computers and Technology
2 answers:
olchik [2.2K]2 years ago
8 0

Answer:

RAM, CPU, GPU, SSD

Explanation:

RAM: Random Acces Memory

CPU: Central processing unit.  Aka the brans of a computer.

GPU: Graphic Prosessong Unit.  This makes the graphics if the computer.

SSD: Solid State Drive: This is where the computers storesit’s files, this is also knows as the “storage”.

jeyben [28]2 years ago
4 0

Explanation:

A computer system can be divided into two components which are responsible for providing the mechanisms to input and output data, to manipulate and process data, and to electronically control the various input, output, and their storage. ... They are known as hardware and software.

You might be interested in
What was that show where lowe’s were based off eye colors and the main character had orange eyes that let her mind control peopl
UNO [17]
The Innocents on Hulu i think
7 0
2 years ago
Read 2 more answers
Search the Web for three different employee hiring and termination policies. Review each and look carefully for inconsistencies.
aksik [14]

Answer:

Search the Web for three different employee hiring and termination policies. Review each and look carefully for inconsistencies. Do each of the policies have sections addressing information security requirements? What clauses should a termination policy contain to prevent disclosure of an organization's information? Create your own version of either a hiring or termination policy.

Explanation:

Search the Web for three different employee hiring and termination policies. Review each and look carefully for inconsistencies. Do each of the policies have sections addressing information security requirements? What clauses should a termination policy contain to prevent disclosure of an organization's information? Create your own version of either a hiring or termination policy.

4 0
2 years ago
What is required for sitting with your seatbelt on while driving?
Alexxandr [17]
It should be D I believe
5 0
2 years ago
A=1/2h(a+b) solve for h
devlian [24]

A=1/2h(a+b)

1/2 can be said as 0.5

so

A=0.5h(a+b)

0.5h is being multiplied with (a+b), taking this expression of left hand side gives

A/0.5(a+b)=h

OR

h=A/0.5(a+b)

This is the final answer

8 0
3 years ago
why do networking components need more examination from an information security perspective than from a systems development pers
padilas [110]
Networking components will eventually interact with computers and devices outside of itself. Whereas during system development you are only interacting with your program internally.

For example, when you first work on a website you can begin working on it on your personal computer not connected to the outside world. When you are done working on your website you will now upload it to a webserver (or you will create your webserver) and now you are opening up the doors so to speak to the Internet. When you "open the door" you need to make sure the proper security is in place so that no one hacks your site. This is ussually done by making sure the webserver you are on does not have any known security vulnerbilities and has the proper firewall settings to prevent unauthorized access.
4 0
3 years ago
Other questions:
  • The magnavox odyssey was a commercial success
    13·1 answer
  • Think of a game you are familiar with and identify at least three team responsibilities which were required to make the game, on
    5·1 answer
  • Which is an example of a screenshot?
    7·2 answers
  • What is a flash player?
    9·2 answers
  • Drag each storage device to its category.
    7·1 answer
  • This is not an appropriate business use for a wiki. editing corporate documents getting customer feedback project management pub
    11·1 answer
  • X = 19 y = 5 print (x % y)
    11·1 answer
  • Password is an example of an authentication mechanisms that is based on " what an entity has".
    6·2 answers
  • You make an online purchase of a hooded sweatshirt with the logo of the Dallas Cowboys. The next time you log on, your screen ha
    9·1 answer
  • A short-range wireless network is called:
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!