1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tomtit [17]
2 years ago
11

When the CPU performs the work described in the commands,

Computers and Technology
1 answer:
Bezzdna [24]2 years ago
8 0

Answer:

(A) execute

This is the answer

Brainliest?? no way right?

You might be interested in
A(n ____ is information that a web server stores on a client computer, such as the client’s preferences when accessing a particu
gayaneshka [121]
<span>A COOKIE is information that a web server stores on a client computer, such as the client’s preferences when accessing a particular web site, or where the client has been on the web site.</span>
7 0
3 years ago
Which of the following, (1) money deposited in a bank account, (2) student recording her answer to a question in an online test,
tamaranim1 [39]

An Information System is when key components such as hardware, software, data, and process are combined for collection, processing, and distribution of data. All of these scenarios mentioned on the choices above are considered transactions in an information system. There is an exchange of information that fully satisfies the request of a user and describes what transactions in information systems are. They are good examples of users entering information whether, physically or electronically, as data into computers. This data is then processed, and the database changes adjusted with some being made permanent.

3 0
3 years ago
Java: which expression is evaluated first
nignag [31]

Answer:c ll d  

Explanation:

cus they are inside ()--parantheses

5 0
3 years ago
A security system uses sensors at every door and window which will set off an alarm if any one of them is opened. There is also
jeka57 [31]
Well think of it like this lets say this wasn't and security system and it was a video game console and remote.
 Now the console or keypad or the main components the power on or shut off the devices and the remote or sensors are the secondary parts but they are needed to help the console or keypad figure out what they are doing.
5 0
3 years ago
Which of the following devices are least likely to deny a connection inline when an attack is detected? (select 2)
user100 [1]

Answer: Option (A) & (D) are correct.

Layer 2 switch is commonly referred to as a type of network or device switch that tends to work on data link layer and use MAC addresses in order to determine the route through which the frames are forwarded.

An IDS known as intrusion detection system is commonly referred to as a device or application that controls a network for malevolent activity and its policy violations.

7 0
3 years ago
Other questions:
  • Explain the role of the domain name system
    15·1 answer
  • The first screen you see when you open word2016 what is called?​
    5·2 answers
  • What is the gauge manifold made of
    14·1 answer
  • How can a student manage time and stress for better results in school? Check all that apply. by taking breaks while studying by
    8·2 answers
  • Controlling access of information on the internet
    15·1 answer
  • . Which of the following is NOT a valid declaration for a character string?
    6·1 answer
  • Is Filmora 9 or Final Cut Pro Better for personal use?
    12·1 answer
  • In a _____, there is no skipping or repeating instructions. A. iteration B. sequence C. selection D. conditional
    10·1 answer
  • what is one category of software mentioned in the unit materials as being example of groupware English technical
    15·1 answer
  • Which artificial intelligence term is used to describe extracting information from unstructured text.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!