1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pychu [463]
2 years ago
5

Identify 5 internal and external hardware components of a server

Computers and Technology
1 answer:
UNO [17]2 years ago
5 0

Answer:

Internal:

#CPU; That retrieves &execute instructions.

#Modem; Modulates& demodulates electric signals.

#RAM;Gives application a place to store &access data on a short time periods.

External:

#Mouse; Transmits commands and controlling movements.

#Moniter; Device used to display video output from computer.

#Printer; Accepts text, graphics to the paper.

Explanation:

Hope this will help you.

You might be interested in
In statistics the mode of a set of values is the value that occurs most often. Write a program that determines how many pieces o
Feliz [49]

Answer:

  see below

Explanation:

The program of interest is the function "findMode[x, n]" in the attached. It is written the Wolfram Language of Mathematica.

The basic idea is that the data in the array is sorted. The sorted array is partitioned into sets of identical elements, and the number in each of those sets is counted. The maximum of those counts is the mode. The location of the maximum count corresponds to the location of the set having that count. We use that location information to pull out the mode value(s).

If there is more than one mode, all are reported.

__

An example data array is provided, along with the program output.

6 0
3 years ago
A computer that is not connected to a network is called a........​
Lesechka [4]

Answer:

standalone computer

Explanation:

If your PC is not connected to a network, it is referred to as a standalone computer.

Hope this helped and have a good day

5 0
1 year ago
Read 2 more answers
Some problems are better solved by a computer and some are better solved by humans.
aalyn [17]

Answer:

I say when u don't know the answer completly.

3 0
2 years ago
Which behaviors might lead someone to have a low credit score?
stepladder [879]
A is the correct answer. You build credit by using credit cards and paying your bills on time.
4 0
2 years ago
Contast between backups controlled within the SAN and backups controlled from the application server.
luda_lava [24]

Answer and Explanation:

Backup control within the SAN is one which confines the backup to the SAN and does not pass it via corporate network.

Backup traffic within the SAN are  easier to maintain and easily handled in contrast to the application server.

Backup in SAN is governed by  such applications and mechanism which allows the easy handling of the backup traffic which is not provided by the application servers.

In case of occurrence of any failure,  unlike application server, SAN provides smooth and fast migration

SAN holds data in cluster  by the use of backup techniques not used in application server.

6 0
2 years ago
Other questions:
  • The keyboard shortcut to save a file is _______.<br><br> Ctrl-s
    12·1 answer
  • Software that was designed to serve the needs of a specific company or organization is called:
    5·1 answer
  • How long will twenty percent of battery life last me?
    14·2 answers
  • The conflict between the user's goal for unfettered access to data and the security administrator's goal to protect that data is
    5·2 answers
  • g Write a function called price_of_rocks. It has no parameters. In a while loop, get a rock type and a weight from the user. Kee
    13·1 answer
  • A vehicle fails an HC emission test at idle and 2,500 rpm, and the engine has an acceleration stumble. The heated oxygen sensor
    15·1 answer
  • An application with which you can perform calculations on numbers and work with other data
    8·1 answer
  • (BRAINLIEST QUESTION!!!)
    11·1 answer
  • Matts has finished running some security automation scripts on three newly deployed Linux servers. After applying intrusion dete
    7·1 answer
  • Complete the statement below using the correct term.<br>Website managers use<br>every day​
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!