1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irakobra [83]
3 years ago
12

How is information processed within a motherboard between the hard drive, CPU and RAM,

Computers and Technology
1 answer:
qwelly [4]3 years ago
7 0

Answer:

The CPU or processor is the "brain" of the computer. It performs all the operations that the computer does, from the simple encoding of text to the complex rendering of video. So, the faster the speed of your processor, the faster your computer will run.RAM is second to the CPU in determining your computer's performance. It temporarily stores your computer's activities until they are transferred and stored permanently in your hard disk when you shut down or restart." RAM is measured in gigabytes (GB), and the average modern computer has between 4-8 GB of RAM. The more RAM your computer has, the faster it runs (up to a point). The hard disk drive, more commonly known as the hard drive or hard disk, is where all data and programs are stored in your computer permanently, unless you delete them. Generally speaking, a hard disk with a higher capacity is always better.

You might be interested in
Question 1(Multiple Choice Worth 5 points)
vlabodo [156]

Answer:

Information assurance

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Information assurance is a broad category that is typically used by cybersecurity or network experts to protect sensitive user information such as passwords, keys, emails, etc., in both digital and hard-copy forms

6 0
3 years ago
The part of the computer that provides access to the internet is the-?
Rina8888 [55]
The answer is D. Modem
7 0
3 years ago
Read 2 more answers
A large gambling company needs to be able to accept high volumes of customer wagers within short timeframes for high-profile spo
Dima020 [189]

Answer: A. a mobile app that only accepts wagers based on the user's location

Explanation:

Elastic cloud simply refers to the cloud computing offering which due to the need for change helps in the provision of variable service levels.

Based on the information given in the question, an effective elastic Cloud solution that can meet this client’s needs is a mobile app that only accepts wagers based on the user's location.

Since there are strict laws that prohibit gambling activities outside the licensed zones, the user location is vital in the mobile app.

5 0
3 years ago
What command is used to generate an RSA key pair?
Leokris [45]

Answer:

D) crypto key generate rsa

Explanation:

In cryptography, the RSA refers to Rivest–Shamir–Adleman. This is an algorithm used for encrypting and decrypting messages in computers thereby ensuring secured transmission of data. In order to generate an RSA key pair, you will use the command crypto key generate rsa while in the global configuration mode. This command has the following syntax:

crypto key generate rsa [general-keys| usage-keys| signature| encryption] [<em>labelkey-label</em>] [exportable] [modulus <em>modulus-size</em>] [storage <em>name of device</em>:][redundancy][on <em>name of device</em>:],

with each parameter having its description

5 0
3 years ago
What materials could I use to make diy headphones and game controller (doesn't have to work) it needs to be handmade so no store
Veseljchak [2.6K]
The materials you could use to make DIY headphones are the following:
Headband - A headphone has a headband used to put over your head. You can use a normal headband for this.
Small Tin Cans - This can be used for the housing of the speaker.
Foam - The speaker has earpads. You can use foam for this.
Wire with jack - You can use a wire with a jack from an old broken earphone or headphone.
Speakers - This one is hardest and the most important part of the headphone. You can look up how to make one using magnets and copper wire or you can just recycle an old pair of working speakers that fit in tin can housing.
4 0
3 years ago
Other questions:
  • Sam says that when he clicks on his schedule on the Internet, his computer is a receiver, not a sender. Is Sam correct? Why or w
    7·1 answer
  • What is the best approach to handling the expectation of privacy by employees in the event an investigation needs to be carried
    15·1 answer
  • What is difference between RAM and ROM?
    13·1 answer
  • When it comes to safety, the choice to be safe is often up to __________?
    8·1 answer
  • The acronym ________ is used by programmers to refer to the fact that computers cannot tell difference between good and bad data
    8·2 answers
  • Differentiate between Software as a service, platform as a service and infrastructure as a service.
    14·1 answer
  • What do people in japan use to make anime
    5·1 answer
  • What would you need to have on your foley stage
    9·1 answer
  • What if the result of conectivity testing is 100%Loss?Explain.​
    14·1 answer
  • Sarah is a detall-oriented programmer. While testing her program, what other skill would she have to apply in order to detect al
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!