1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kirza4 [7]
3 years ago
13

WHAT ARE THE MOST USED AND POPULAR PROCESSOR

Computers and Technology
2 answers:
den301095 [7]3 years ago
8 0

Answer:

As you shop around for computers, you'll notice certain processor names that continually pop up. One of the most common is the Intel® Core™ series: the i3 processor, i5 processor, and i7 processor. As the names suggest, the i3 processor is less powerful than the i5, and the i7 is the most powerful of the three.

hope helpful <3

ladessa [460]3 years ago
6 0

Answer:

i3 processor, i5 processor, AMD Athlon 64

You might be interested in
What two statements about IPv6 addresses are true? This task contains the radio buttons and checkboxes for options. The shortcut
Oliga [24]

Answer:

A and C

Explanation:

Option A:

In IPv6 there is a rule to reduce an IPv6 address when there are two or more consecutive segments of zeros just one time. This rule says that you can change the consecutive zeros for “::”  

Here is an example

How to reduce the following IPv6 address?

ff02:0000:0000:0000:0000:0000:0000:d500

Ans: ff02::d500

Example 2:

2001:ed02:0000:0000:cf14:0000:0000:de95

Incorrect Answer -> 2001:ed02::cf14::de95  

Since the rule says that you can apply “::” just one time, you need to do it for a per of zero segments, so the correct answer is:

Correct Answer -> 2001:ed02::cf14:0:0:de95

Or

2001:ed02:0:0:cf14::de95

Option C:

Since in IPv6 there are 2^{128} available addresses which means 340.282.366.920.938.463.463.374.607.431.768.211.456 (too many addresses), there is no need of NAT solution, so each device can have its own IP address by the same interface to have access through the internet if needed. If not, you can block the access through internet by the firewall.

4 0
4 years ago
To assist a user, a help desk technician is able to take advantage of a Windows proprietary network protocol that allows the tec
puteri [66]

In order to assist an end user, a help desk technician can use the network protocol with a default TCP/IP port number of <u>3389</u>.

<h3>What is the TCP/IP protocol suite?</h3>

The TCP/IP protocol suite is an abbreviation for Transmission Control Protocol and Internet Protocol and it's a standard framework for the transmission (prepare and forward) of information on digital computers over the Internet.

In the Transmission Control Protocol and Internet Protocol (TCP/IP) suite, a help desk technician can use the network protocol with a default TCP/IP port number of <u>3389</u> to assist an end user by opening a graphical user interface to connect with the end user's Windows computer.

Read more on TCP here: brainly.com/question/17387945

#SPJ1

7 0
2 years ago
What is this computer​
Salsk061 [2.6K]

Answer:

A Macintosh

Explanation:

6 0
3 years ago
All of the following are U.S.-EU data privacy requirements except:
Montano1993 [528]

Answer:

b. Redundant hardware and data backup systems

Explanation:

Data privacy is important where a company collects, processes and stores personal information.In the US-EU have laid down regulations to ensure data privacy is maintained. It is a requirement before collection of personal data, to clearly state why the data is being collected and how it will be used.The individuals whose data is being processed have a right to access their data at no cost during processing . Of great importance is the security of the data so as to maintain its integrity, Companies are required to take steps in protecting the data from unauthorized access, processing and accidental loss.redundant hardware and data backup system are used by companies as a fail-safe mechanism in data protection but they are not a requirement in data privacy, although they enhance it.

8 0
3 years ago
In what decade did the Internet begin to be used widely by the public and not just government entities?
Allisa [31]
In the 1980's the internet was open to the public
But it wasn't until the 2000's that it started to be widely used
Your answer is C 2000's
3 0
3 years ago
Read 2 more answers
Other questions:
  • Where does cable termination occur in most buildings?
    9·1 answer
  • Pixels are small dots in columns and rows that allow an image to be seen on a display screen.
    6·1 answer
  • Jim is an experienced security professional who recently accepted a position in an organization that uses Check Point firewalls.
    7·1 answer
  • SHOW ME SOME C++ TUTORIALS?
    10·1 answer
  • In the Mouse Properties window, you can?
    8·1 answer
  • Write a program in which you input three numbers they canhave decimals so float values and the program gives you the minvalue ou
    8·1 answer
  • Which are three possible text formatting actions in wordpad?
    6·1 answer
  • What is output if the user types in 8
    15·1 answer
  • What can help you estimate how much money you might get in
    7·1 answer
  • What's the use of computer?Where are they used?​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!