1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saw5 [17]
2 years ago
6

As a hardware technician and knowing the internet components of the system unit, list any five(5) of such components.

Computers and Technology
1 answer:
Vaselesa [24]2 years ago
4 0

Answer:

the motherboard, hard disk drive, optical drive, power supply unit, and in some old systems fan and floppy disk drive.

Hope This Helps!!!

You might be interested in
What type of security solution provides a hardware platform for the storage and management of encryption keys?
shutvik [7]

The type of security solution provides a hardware platform for the storage and management of encryption keys exists hardware security modules .

Hardware security modules (HSMs) supply an effective method to control encryption keys.

<h3>What are Hardware security modules?</h3>

A hardware security module (HSM) exists as a physical machine that supplies extra security for sensitive data. This kind of device exists utilized to require cryptographic keys for essential functions such as encryption, decryption, and authentication for the usage of applications, identities, and databases.

The hardware usually costs at least USD 20,000 to deploy, USD 40,000 for increased accessibility, and multiple periods better for normal enterprise deployment.

Hardware Security Modules (HSMs) exist in hardened, tamper-resistant hardware appliances that strengthen encryption techniques by developing keys, encrypting and decrypting data, and designing and demonstrating digital signatures.

A Hardware Security Module (HSM) exists as a hardware-based protection appliance that develops, stores, and protects cryptographic keys. Sterling Secure Proxy utilizes keys and certificates stored in its store or on an HSM.

To learn more about Hardware Security Module refer to:

brainly.com/question/24118720

#SPJ4

7 0
2 years ago
Comparison <br> Cloud computing and parallel processors
V125BC [204]

Anwser is 2/3

Explanation:

7 0
3 years ago
A ____________would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a_____________
seraphim [82]

Answer:

The answer to this question is vulnerability and risk.

Explanation:

Vulnerability is there us misconfiguration in the system  and we know that our system is vulnerable means the hacker can gain unauthorized access to our system.

Risk is when there are chances that a misconfiguration  might happen in our system in future so that hacker could gain unauthorized access to the system.

7 0
3 years ago
This is me lol jjaaaabbooo
ElenaW [278]

i like your glasses uwu

6 0
3 years ago
We have an array of Rectangles called rectangleArray and a function updateRectangle(rect) that takes a single rectangle as a par
Naddika [18.5K]

Answer:

Following are the code  

for(var k = 0; k< rectangleArray.length; k++) // iterting the loop

{

updateRectangle(rectangleArray[k]); // update the rectangle color

}  

Explanation:

  • In the given answer we have iterate over the loop will iterated until the length of rectangle array size-1
  • In every value of k, we have called the update rectangle function which changes the color of the rectangle of a rectangle class
4 0
3 years ago
Other questions:
  • The physical components of information technology, which can include the computer itself plus peripherals such as storage device
    15·1 answer
  • 1. Write a program that asks the user to enter a string. The program should then print the following: (a) The total number of ch
    11·1 answer
  • What is the purpose of a transistor?
    13·2 answers
  • Papa Mario of Mario's Pizzeria has baked a huge pizza and cut it into n slices, but he is clumsy and the pizza wasn't evenly sli
    14·1 answer
  • Your mother wants to purchase a large hard drive for her computer ex you to see what type of dry interphase she has her computer
    11·1 answer
  • Write code that prompts for three integers, averages them, and prints the average. Make your code robust against invalid input;
    7·1 answer
  • A database design where certain data entities are combined, summary totals are carried in the data records rather than calculate
    5·1 answer
  • Which of these is NOT a benefit of being connected 24/7?
    11·1 answer
  • A browser is a program that allow
    11·1 answer
  • 6) Read the article posted on The Verge entitled How to fight lies, tricks, and chaos online and summarize the four steps. Then
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!