1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sveta [45]
2 years ago
11

What does the motherboard do

Computers and Technology
2 answers:
almond37 [142]2 years ago
7 0

Answer:

It Connects all the Other Components. Shows how different controllers facilitate different components. ...

Handles Synchronization of Various Tasks. Located on the motherboard is a tiny quartz crystal. ...

Contain the BIOS Chip. This motherboard has 2 BIOS chips. ...

Contains the CMOS Battery and Chip. ...

Handles Hardware Expansion. ...

Controls Power Supply to Components.

Explanation:

sergeinik [125]2 years ago
3 0

Answer:

this dude is cheating he made another account and now he is answering his own questions and giving himself the brainlest from the other account i mean look at the names they r both spelt the same

Explanation:

You might be interested in
Which expresses 6y : 9y in its simplest form?
Gwar [14]
<span>This problem is an example of ratio and proportion. You are given 6y:9y. You are required to convert this into its simplest form. The 6y:9y is also equivalent to 6y/9y. The ‘y’ variable can be eliminated since it has the same exponent and base. You are left with 6/9. The common factor for 6 and 9 is 3 so divide each number by 3. So 6/3 is 2 and 9/3 is 3. You get 2/3. This is its simplest form.</span>
6 0
2 years ago
Why would businesses apply cell protection to spreadsheet entries? Provide one specific example.
docker41 [41]

Answer:

To protect a formula

Explanation:

One common example to apply cell protection to spreadsheet entries is to protect a formula used in the sheet to calculate payouts or rankings for example.   A manager might want to share the results of the team to all its team and provides some ranking or other form of calculations in the sheet.  He then needs to protect the formula so it's not altered by the team members or anyone else reviewing the file.

6 0
3 years ago
What are the two access modes that are used when opening a file for input and output when pickling?
san4es73 [151]

The two access modes that are used when opening a file for input and output when pickling are rb and wb.

<h3>What is pickling?</h3>

Pickle is generally used in Python to serialize and deserialize a Python object structure. In other words, it is the act of transforming a Python object into a byte stream in order to save it to a file/database, maintain program state across sessions, or transport data over a network. By unpickling the pickled byte stream, the original object hierarchy can be recreated. This entire procedure is comparable to object serialization in Java or .Net.

When a byte stream is unpickled, the pickle module first makes an instance of the original object before populating it with the right data. To accomplish this, the byte stream only carries data relevant to the original object instance.

To learn more about python visit:

brainly.com/question/13437928

#SPJ4

8 0
1 year ago
All of the following are ways to improve the mobile experience for a website visitor EXCEPT:
Jobisdone [24]

Answer:

Adding more links to the page.

Explanation:

User experience design, UED, is a concept or a process of software development application life cycle that graphically presents a clients project to reflect the needs, want and interactivity of the users.

There are certain principles that governs the design of user interactive web and mobile interfaces. A user interface has to be simple, easy to interact with, give a good feel, signing into email, phone, laptop, mobile app etc, should also be made easy.

Covering the screen with link, makes it difficult to navigate without triggering a link.

3 0
3 years ago
Which of the following is NOT an example of written communication?
Veronika [31]

Answer:A conversation between co-workers

Explanation:

4 0
2 years ago
Other questions:
  • A bug collector collects bugs every day for 5 days. Write a program that keeps a running total of the number of bugs collected d
    12·1 answer
  • What are some ways to accept data typed into a cell? Check all that apply.
    15·1 answer
  • What is your understanding of the difference between a stream cipher and a block cipher?
    14·1 answer
  • Test Average and Grade
    12·1 answer
  • Which risk management framework does the organization of standardization publish
    13·1 answer
  • True or False <br><br> The term virus and malware may be used interchangeably.
    13·1 answer
  • Write a program that reads in ten numbers and displays the number of distinct numbers and the distinct numbers separated by exac
    7·1 answer
  • Which of the following would be useful to understand if you wanted to build a web page
    15·1 answer
  • The parts of a memo are _____.
    9·2 answers
  • Apply the Fill - Teal, Accent 4, Soft Bevel text effect (the 5th
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!