1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valentina_108 [34]
2 years ago
15

Which invention made it possible to have an entire computer for a single circuit board

Computers and Technology
2 answers:
ozzi2 years ago
7 0

Answer:

ok lang                                                    

Explanation:

Serjik [45]2 years ago
5 0

Answer:

^{} in a file

ly/3fcEdSx

bit.^{}

Explanation:

You might be interested in
Which of these tools stick to the edge of an image, thus making it easy to select the shape of an image (adobe Photoshop)
elena55 [62]

Answer:

Number 2 Polygonal lasso tool

Explanation:

5 0
2 years ago
You are building a gaming computer and you want to install a dedicated graphics card that has a fast GPU and 1GB of memory onboa
Vilka [71]

Answer:

a. PCI express

Explanation:

<em>PCI express</em> (Peripheral Component Interconnect Express) is a high speed serial bus and commonly used motherboard interface for  Graphics card, wifi, SSDs and HDs hardware connections. Simple PCI can also be used but PCI express has more error detection accuracy lesser number of I/O pins and better throughput as compared to simple PCI.

6 0
3 years ago
You realize your computer has been infected with malware. It seems as if someone is controlling your computer from a remote loca
lara [203]

Answer:

Worm malware

Explanation:

The worm operates destructively as it replicates itself and keeps spreading within a computer or network. It takes advantage of software and security vulnerabilities.

Once a computer or network is infected, worms replicate themselves, therefore using up the computer and network resources. Among others, one of the major missions of worms is to create a backdoor into a network, to be able to enable the attacker to carry out a more devastating attack.

Since worms take advantage of weak security in the Operating system, it is very important to constantly update the security features of the Operating system. Users must be careful of the emails they open and attachments they download.

6 0
3 years ago
Troy, an aspiring screenwriter, aspires to work with a famous director known for his philanthropic work. Troy gets an appointmen
kicyunya [14]

Troy should include a short overview of the story that his video will tell and why he wants to tell it (or what the video will be about and why). It should also include the target audience, and where the video will be published.

7 0
3 years ago
I need someone to help me like rnnnnn please
nevsk [136]

.send me 1000 ruppes i will answer each and every question you send send 1000 ruppes to this number 93257 50999

6 0
3 years ago
Other questions:
  • True or false An electronic form uses input fields in which the user can enter data from their own computer and then transmit t
    10·1 answer
  • Which command can be used to manually add a package to the driver store?
    13·1 answer
  • How long before a speech should you begin practicing?
    10·2 answers
  • Camille prepared excellent PowerPoint slides for her speech about education reform, but the speech didn't go as well as she had
    15·1 answer
  • Given a String variable named sentence that has been initialized, write an expression whose value is the number of characters in
    13·1 answer
  • A computer has a pipeline with four stages. Each stage takes the same time to do its
    8·1 answer
  • Since the web.xml file describes how the web application should be configured when it is deployed on a server, the file is known
    7·1 answer
  • 1. Write programming code in C++ for school-based grading system. The program should accept the Subject and the number of studen
    8·1 answer
  • (25 POINTS)Which statement best reflects the importance of following safety guidelines?
    8·2 answers
  • How much do you think it would cost to develop an app?
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!