1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gala2k [10]
3 years ago
10

Pls help ASAP!! will give brainliest

Computers and Technology
1 answer:
vova2212 [387]3 years ago
7 0

Answer:

a is the CPU

b is the ram

c is the mother board

d is the power supply

e is the hard drive

Explanation:

a is the brain of the computer it directs things

b is the temporary storage  

c the mother board processes things

d this gives the computer power

e is the long storage

You might be interested in
Given the following method definitions: void mystery(double a) { System.out.print("double! "); } void mystery(int a) { System.ou
kicyunya [14]

Answer:

The correct answer to the following question is option "b".  

Explanation:

The method having the same name but the arguments have different so it is called method overloading. It is a part of the object-oriented programming language (oops).  

  • In the given code we define same method two times that is "mystery()". but in this method, we pass two different parameters. For the first time, we pass a double variable that is "a" as a parameter. In the second time, we pass an integer variable that is "a" as a parameter and in both functions, we write some codes.
  • In the calling time, we call function two times. In first time calling we pass an integer value that is "1" and second time calling we pass double value that is "1.0". So the output of this code is "int! double!".  

That's why the option "b" is correct.

6 0
3 years ago
What does nat stand for? network access trigger network administration timetable network address translation network association
Mars2501 [29]
Perhaps I think its NETWORK ADDRESS  TRANSLATIONS
take care:) 
6 0
3 years ago
A technically qualified individual who may configure firewalls and IDPSs, implement security software, diagnose and troubleshoot
sineoko [7]

Answer:

Security technician

Explanation:

Security technicians are responsible for fixing, planning, and implementing the IT and computer security system of organisations by making sure the safety and security of the data and information of the clients as well as the employees that make daily use of the systems

Security technicians administer security access to the clients and employees of the organization and are responsible for being up to date with the latest IT security technology developments.

7 0
3 years ago
A developer working on a time management application wants to make total hours for each timecard available to application users.
Llana [10]

Answer:

The correct option to the following question is A.) .

Explanation:

A Timecard is an application which is used for recording the times the user is working and it is an application for record the time upon logging in to the Web Timesheet, a user punches out and into the mark time they stop and start the works, along with the any comment they choose to enter.

3 0
3 years ago
Johnny is a member of the hacking group Orpheus1. He is currently working on breaking into the Department of Defense's front end
sweet [91]

Answer:

RainbowTables

Explanation:

RainbowTables is the best option when the cracker has limited time.

6 0
4 years ago
Other questions:
  • In Java an abstract class cannot be sub-classed<br><br> ?? True<br><br> ?? False
    8·1 answer
  • A. True
    8·1 answer
  • Which is a false statement considering copyright law?
    13·2 answers
  • List three tacos there are several from the opening page of the help and support center.
    5·1 answer
  • The language C was originally developed by​
    11·2 answers
  • Day 1 of seeing if anyone will buy me a psn gift card (if u do u get brainliest and thanks + alot of points
    11·1 answer
  • Which data type is -7
    13·1 answer
  • What are three ways digital identity is created and kept up? (open answer)
    5·1 answer
  • William brought some data into his Tableau Book, but the data had some null values and incorrect column headers. What did Willia
    15·1 answer
  • Any mobile devices contain a(n) ___ and gyroscope that can sense even the smallest movements.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!