1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pepsi [2]
2 years ago
14

A laptop computer manufacturer would consider the computer's processor chip to be a(n) ______ cost.

Computers and Technology
1 answer:
erastovalidia [21]2 years ago
3 0

Answer:

direct material

Explanation:

if you need anymore help let me know

You might be interested in
Because one memory location can be used repeatedly with different values, you can write program instructions once and then use t
CaHeK987 [17]

Answer:

True.

Explanation:

The statement written in the question is True.We can use one memory location and use it with different values.

For example:- When we are using a loop be it for,while or do-while.The counter that we use for iteration is one and we use that counter to run the loop.We are using a single memory location and we are updating the count in that memory location many times.

for(int i=0;i<1000;i++)

{

     //body.

}

We are using i's memory location and changing it 1000 times.

3 0
3 years ago
What is a full featured word processing program that allows you to create many types of personal and business document.
miskamm [114]
B) Word is the answer
3 0
3 years ago
How are radio waves used on Earth?
kicyunya [14]

Uses of Radio Waves : The prime purpose of radio is to convey information from one place to another through the intervening media (i.e., air, space, nonconducting materials) without wires. Besides being used for transmitting sound and television signals, radio is used for the transmission of data in coded form.

8 0
2 years ago
A software or hardware that checks information coming from the Internet and depending on the applied configuration settings eith
photoshop1234 [79]

Answer:

1. Firewall.

2. Router.

3. Proxy.

4. SMTP, 25.

Explanation:

1. A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

Furthermore, firewalls are typically bidirectional, it checks all sent and received data and only allow authorized traffic through.

2. A router can be defined as a network device that is designed typically for forwarding data packets between two or more networks based on a well-defined routing protocol.

A routing protocol refers to a set of defined rules or algorithms used by routers to determine the communication paths unto which data should be exchanged between the source router and destination or host device.

Additionally, in order for packets to be sent to a remote destination, these three parameters must be configured on a host.

I. Default gateway.

II. IP address.

III. Subnet mask.

3. A proxy can be defined as a computer network service designed to avail end users (clients) the ability to connect indirectly to other network services. For example, a reverse proxy is a type of server that is placed right in front of other servers such as a web server and it forwards or routes the user's (client) requests to those servers sitting behind it. When properly configured, reverse proxy helps to ensure security, reliability and performance of a network.

4. A spam filter can be defined as a software program designed to process all incoming electronic messages (e-mails) and prevents any unsolicited or unwanted mail (spam) from entering the inbox of a client.

Generally, a spam filter uses SMTP with port number 25 to carry out its services.

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

3 0
3 years ago
Which testing is an example of non-functional testing? A. testing a module B. testing integration of three modules C. testing a
Serga [27]

Answer: D

Explanation:

5 0
2 years ago
Other questions:
  • Is a network traffic management device used to connect different network segments together?
    9·1 answer
  • In microsoft windows when a window is minimized what happens to that window
    9·1 answer
  • Write a program that reads the contents of the two files into two separate lists. The user should be able to enter a boy’s name,
    6·1 answer
  • A collection of computers and other hardware devices that are connected together to share hardware, software, and data, as well
    15·1 answer
  • I WILL GIVE BRAINLIEST TO WHO ANSWERS FIRST AND CORRECTLY.
    5·1 answer
  • Write a report on the recent online tuition
    12·1 answer
  • im past 1000 pts and it still hasnt up my rank from VIRTUOSO to EXPERT can someone explain and yes i have brainly plus
    7·2 answers
  • Question 8 (True/False Worth 3 points)
    15·1 answer
  • Camera work is at the center of video production. True or False?
    14·1 answer
  • What number will this code return?<br> Math.max(7, 5, 9);
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!