1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
schepotkina [342]
3 years ago
5

John was teaching his students about the basics of computer hardware and software. By the end of his lecture, he asked his class

to state the basic function that a computer’s control unit performs. Four students answered gave four different answers. George said A) that a control unit performs arithmetical and logical computations. Alex mentioned B)that it stores the data for computations. Helen stated C)that it coordinates the flow of instructions and data within computers. Lastly, Myron suggested D)that it displays results of computations.
which one is it?
Computers and Technology
2 answers:
-Dominant- [34]3 years ago
8 0

Answer:a control unit performs arithmetical and logical computations

Explanation:

vredina [299]3 years ago
4 0
A CPU is the electronic circuitry within a computer that carries out the instructions of a computer program by performing basic arithmetic logical, control and input/output operations specified by the instructions.
Knowing this, the answer is both C - That it coordinates the flow of instructions and data within computers, And A - That a control unit performs arithmetical and logical computations.
If you can only select one answer, I'd personally go with A.
You might be interested in
Question #2
stiks02 [169]

Answer:

Step 1: define task

Step 2: process

Step 3: input

Step 4: output

Step 5: check accuracy

Explanation:

Took the test.

4 0
3 years ago
Which career field has grown most as a result of technological changes?
kondaur [170]
It's A, Service, I just watched a video and it said Service grew the most as technology has advanced 

5 0
3 years ago
Common types of possessed objects are smart cards, rfid-encoded badges, magnetic cards, ____, and smartphones that are swiped th
maxonik [38]
Common types of possessed objects are smart cards, RFID-encoded badges, magnetic cards, USB security tokens, and smartphones that are swiped through or placed close to a reader to be read. The USB security token is a physical security device used to gain access to an resource, that is electronically restricted. <span> The token provides secure storage for multiple login credentials.</span>
5 0
3 years ago
______ is the primary and dominant cryptographic authentication and encryption framework for security development within the TCP
Kitty [74]

Answer:

"IP security" is the correct answer for the above question.

Explanation:

  • "IP security" is a set of rules or protocols which are used for the communication of the network.
  • It is a protocol that is used to encrypt the data which is needed to transfer on the network.
  • It provides security for the communication and it encrypts the data which is needs o transfer on the network.
  • The above question asked about the term which is used for encryption and security. So the answer is "IP security", which is defined above.
7 0
4 years ago
Read 2 more answers
A Trojan horse:
Elis [28]

Answer:

The answer is "option D"

Explanation:

Trojan horse is a software, that is installed on a system and appears benign, but in actual it is the addition of malicious which unexpected modifications in config files and unusual activity even when the computer is idle are strong signs that a Trojan exists on a system. and other options are not correct that can be described as follows:

  • In option A, It is a malware that is also known as Trojan.
  • In option B, It is malware, not a virus but the malware includes viruses.
  • In option C, It doesn't install spyware on the user's computer.
  • In option E, It doesn't use for enterprise networks to penetrate.
4 0
3 years ago
Other questions:
  • How is multiprogramming implemented using virtual memory?
    10·1 answer
  • What is the advantage of using a high-level language over machine language for writing computer programs?
    15·2 answers
  • Ethan is a systems developer. He is working on a system where he will implement independent solutions for different processes. W
    14·1 answer
  • 1.   Which of the following is an example of a primary cost of an accident or injury?
    5·2 answers
  • By including ______
    15·2 answers
  • If you need to provide a storage server with fault tolerance through the use of multiple paths between the server and the actual
    14·1 answer
  • Write a program in Cto define a structure Patient that has the following members
    12·1 answer
  • Python;
    6·1 answer
  • What is coupling in computer science <br><br>​
    13·2 answers
  • True or False? Voice recognition is the process of determining the meaning of the words spoken by a human.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!