1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Eva8 [605]
2 years ago
6

You learned that "The CPU interacts with memory in a process that is known as

Computers and Technology
1 answer:
____ [38]2 years ago
3 0

Answer:

okay this is going to be weird but hopefully it helps you go to a restaurant you use the menu to place an order the waiter analyzes the order and then it brings it to you

Explanation:

so in other words the menu is bringing up what you want

the waiter is the person who analyzes the order

and then to put it to action is when you receive the order and eat it.

I know this is a weird analogy but I hope it helps

You might be interested in
HELP URGENTLY!!!!!
Ganezh [65]
Which field TCP header is not typically used in modern networks
5 0
3 years ago
Which of the following is an appropriale way to declinc an offer in a<br>professional environment?​
alina1380 [7]
If you’re looking for an exact answer, we weren’t given any options, but in my personal experience just explain that you appreciated them taking their time out of their day and say that you’re no longer interested in their offer.
5 0
3 years ago
Read 2 more answers
What is the method for removing a single item in History?
tiny-mole [99]
B is my answer im guessing
3 0
3 years ago
Read 2 more answers
What is the difference between cut and paste​
Novay_Z [31]

Answer: The main difference between Cut Paste and Copy Paste is that Cut Paste will remove the original content from the document and place it in a new location while Copy Paste inserts the content to a new location without removing the original content.

Explanation:

7 0
2 years ago
LITERALLY PLS ANYONE!!! 90 pointsss!
Doss [256]

7. Intentional Virus Setting is when you the user purposely spread computer viruses in order to do harm. It should be noted that this is highly illegal (no duh) with a sentence of up to 10 years and $250,000 in penalties assuming you are convicted under the Computer Fraud and Abuse Act of 1986 here in the States.

8. intrusion of solitude, appropriation of name or likeness, public disclosure of private facts, and false light.

9.  Intentionally creating and/or sending a virus and infecting people's computers is against the law, and can result in jail time or a fine.

10. Some examples are: Deception - Lying about how information will be used. Violation of confidentiality - Disclosing someone's personal information without consent. Intrusion - Interference in an employee's personal life. Misappropriation - Using a person's likeness to promote a product without his consent.

11. Everyone wants PRIVACY for themselves, and everyone wants ACCOUNTABILITY from others. Privacy is a basic human need, and invasion of privacy can have serious psychological and emotional consequences, including paranoia, anxiety, depression and broken trust. Invasion of privacy is both a legal and an ethical issue.

12. A cause of action for invasion of privacy entitles the plaintiff to recover damages for the harm to the particular element of his or her privacy that is invaded. Thus, one who suffers an intrusion upon his or her solitude or seclusion, may recover damages for the deprivation of his or her seclusion.

13. An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet. Many businesses and educational facilities require that employees or students sign an acceptable use policy before being granted a network ID.

14. Intellectual property refers to creations of the mind: inventions; literary and artistic works; and symbols, names and images used in commerce. Intellectual property is divided into two categories: Industrial Property includes patents for inventions, trademarks, industrial designs and geographical indications.

PLEASE PLEASE PLEASE HELP WITH MY RECENT!!!!!!

btw hope this helps if it does please make brainliest :)

6 0
3 years ago
Read 2 more answers
Other questions:
  • This is an electronic method used to send and receive data–voice, text, images, and video.
    13·2 answers
  • What network setting do i need for a workgroup?
    5·1 answer
  • Asian-American men are often represented in the media as _____.
    8·2 answers
  • What is the statement describing? Agile team continuously adapt to new circumstances and enhance the methods of value delivery
    6·1 answer
  • When creating a chart or graph, which should be completed first?
    9·2 answers
  • (5 points) Create a user-defined data structure (i.e., struct) called Point that represents a two-dimensional Cartesian coordina
    5·1 answer
  • Different network scenarios require the
    9·1 answer
  • The image below shows a weather service map
    13·1 answer
  • Synapse is not working and is crashing every time you attach it. What should you do?
    13·1 answer
  • Software is in -----language​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!