the processing is done in the​

Answers

Answer 1

Answer:

CPU Central Processing Unit

Answer 2

Answer:

CPU.... I'm not sure but it might be right or can u put the full question because it sorta don't make any sense


Related Questions

Philp has taken selfie wearing T-shirt that read "California 92." However, the text is mirrored in the selfie. He wants to upload this picture wothout the mirrored effect.
To correct the mirroring text, Philip can (flip, crop, distort) the picture (vertically, horizontal, diagonally).

Answers

Answer: flip the picture vertically

Explanation: horizontally would make it upsidedown. And diagonally isn’t right either.

define file in context of computer programming​

Answers

a file is a computer resource that stores data, info, settings or commands discreetly in a computer storage device. a file may be written to display icons, a written message, or a computer program and other kinds of data.

Would be easier to divide/fold a rectangular sheet of paper into 22 equal pieces or 24 equal pieces? Explain your answer. Please help !!!!!

Answers

Answer:

24 equal.

Explanation:

What is the velocity of a 0.100kg car with a momentum of 5 kgm/s?

Answers

Answer:

v = 50 m/s

Explanation:

p = mv

5 = 0.1v

v = 50

If an application holds more data than what it was designed to hold, which incident can occur?

Answers

Answer: I think the best answer is B.

Explanation:

I am not complely sure, sorry.

Hope it helps though!!

1 pts Question 5 Which of the following calculations would evaluate to 12? (36) + 2/2, 3* ((6+2)/2), 3* 6+2/2, (306+ 2)/2​

Answers

Answer:

Could you seperate them if they are different answers? I'm lost, sorry!

Explanation:

What does a WLAN use to transmit data to clients

Answers

Here's link to the answer:

tinyurl.com/wpazsebu

write 3 things that can't be done without technology.

Answers

Answer:

Hacking Online Orders Math

Explanation:

1.Shopping 2.Talk long distance. 3.Watch a movie

Each menu title in an application does not need to have a unique access key.

Answers

Answer:

Explanation:

True

The rules on the Internet for how messages are addressed and passed on are called ____ .

Answers

Answer: Internet Protocal (IP)

___are designed to infect and cause damage to operating system files, computer registry, and other locations on the motherboard

Answers

Answer:

Viruses

Explanation:

virusues are designed to infect and cause damage to operating system files, computer registry, and other locations on the motherboard

What is the pencil tool in photoshop

Answers

Answer:

I think its to draw on the photo.

Explanation:

Answer:

draw

Explanation:

it opens the drawing menu

Which step comes last?

Gather data from the user.
Process the data.
Check for accuracy.
Output the result.

Answers

Answer: Process the data

Explanation: i took the test

Answer:

The answer is Check for accuracy

Explanation:

A PIN is easier for the account owner to use and remember because it is shorter than a password. However, a PIN can only be used once. However, it is also easier for hackers to steal. However, a password can safely be stored. However, it is more difficult for hackers to steal.

Answers

Answer:

Pin

Explanation:

Pin number works for me.

Where was basketball invented?

Answers

Answer:

Springfield, Massachusetts

Basketball was invented by James Naismith on or about December 1, 1891, at the International Young Men's Christian Association (YMCA) Training School, Springfield, Massachusetts, where Naismith was an instructor in physical education. who invented James Naismith

Explanation:

Springfield College

Basketball is built into the fabric of Springfield College. The game was invented by Springfield College instructor and graduate student James Naismith in 1891, and has grown into the worldwide athletic phenomenon we know it to be today.

have a good day

When a 30-year-old physical education teacher from the International YMCA Training School in Springfield, Massachusetts created a game that could be played indoors in between the football and baseball seasons, basket ball was born in the winter of 1891.

What is physical education?

Physical education is a subject that is taught in schools all over the world. It is frequently abbreviated as Phys Ed or P.E. In order to enhance health and physical fitness, it is typically taught in primary and secondary education.

It emphasizes psychomotor learning by employing a play and movement exploration context. Football, netball, hockey, rounders, cricket, four square, racing, and several other kid-friendly games are among the exercises included in physical education.

Additionally, nutrition, healthy practices, and individual needs are taught in physical education. The world over, there are several physical education curricula.

When taught properly, physical education classes can have a favorable impact on students' behavior, health, and academic achievement. The dissemination of knowledge about illness prevention, control, and treatment is a component of health education.

Physical educators must encourage and reinforce students' growing motor abilities and give kids and teenagers a foundational skill set that expands their movement repertory.

Learn more about physical education, here

https://brainly.com/question/28271935

#SPJ6

Give 3 features and uses of
Desktop
laptop
palmtop computer

Answers

Answer:

A Palmtop or hand-held personal computer is small enough to hold in one hand and operate with the other. Also called a handtop, these ultra-small computers may have specialized keyboards or keypads for data entry applications or have small qwerty keyboards.

• Palmtops are also called PDAs, hand-held computers and pocket computers.

• Palmtop or hand-held personal computer, lightweight, small, battery-powered, general-purpose programmable computer. It typically has a miniaturized full-function, typewriter like keyboard for input and a small, full color, liquid-crystal display for output. In addition to an operating system that is compatible with that of a desktop computer, a palmtop will typically contain a word processor, a spreadsheet program, and a calendar and phone book. A variety of other programs can be loaded and executed, and data can usually be transferred to and from a desktop computer. Although some palmtops are like personal digital assistants in that they accept handwritten or touch screen input, they generally differ in that the palmtop has more memory, a keyboard, and a greater variety of available programs.

Explanation:

the best answer it requests services, data and other resources available on the server​

Answers

Answer:

Explanation:

?

What is the HTML code symbol to the !nstagram Facts Part 2?

FIRST ONE GETS BRAINEST!!

Answers

¶^↑↓→← html code symbol

How can I hide my cracked phone screen? or How can I fix it myself without my parent finding out? or How can I fix my phone without going to a repair shop?

Answers

Ummm I don’t know how to answer that


8. (a) Identify two advantages and four limitations of the Speech recognition devices.

Answers

Explanation:

Speech recognition technology allows computers to take spoken audio, interpret it and generate text from it

Write an advert to recruit teachers for a given Senior High School. The advert should cover tittle, job description, employees specifications, mode of application condition of service, closing date

Answers

Answer:

Hey! Have you ever wanted to work with kids? Do you know a lot about mathematics? Well I've got the job for you! You can be a Senior High School teacher! The job is simple, all you have to do is teach your students about mathematics every day. Let us know by July 31st if you would like to be a teacher for this upcoming fall semester.

Explanation:

Activity in September 2014, the Federal Bureau of Investigation (FBI) announced that is next generation Idenufication system was fully functional The FBI named it the integrated Automated Fingerprint Identification system (IAFIS), Conduct online research on this system and answer the following questions 1. Which elements can be stored in IAFIS? 2. What is the response time of this system? 1. How has this system benefited the FBI​

Answers

Answer:

(Answers may vary.)

In addition to fingerprints, IAFIS stores criminal histories, mug shots, and physical information like scars, tattoos, eye color, hair color, weight, and height. It also stores fingerprints of individuals who are or were employed by the US military and the federal government.

The system’s average response time for criminal fingerprint processing is about 27 minutes. Civil fingerprint processing takes over an hour.

Previously, the tenprint submission and identification was a manual, tedious process. It took the FBI weeks or months to process a single fingerprint submission. IAFIS has automated this process and added advanced identification capabilities. The submission and processing takes just few minutes. This has helped the FBI solve and prevent crime and tighten holds on criminals and terrorists.

Explanation:

you must regularly do this on your computer to prevent a virus from infecting it​

Answers

Answer; Install Anti-Virus/Malware Software. ...

Keep Your Anti-Virus Software Up to Date. ...

Run Regularly Scheduled Scans with Your Anti-Virus Software. ...

Keep Your Operating System Current. ...

Secure Your Network. ...

Think Before You Click.

Explanation:

i took the test

Answer:

Clean out unneeded folders, scan your pc with an anti virus, use a vpn, and download from trusted websites

Explanation:

Hey Yo, i need some help, Whats 2+2?

Answers

Answer:

4

Explanation:

The answer to the question is four.

Which functions are available in a Word table? Check all that apply.
Data Sort
Images
Formulas in Cells
Header Row
Page Numbers

Answers

Answer:

Hello! I think the answer is formula in cell

A video streaming website uses 32-bit integers to count the number of times each video is played. in anticipation of some videos being played more times than can be represented with 32 bits, the website is planning to change to 64-bit integers for the counter. which of the following best describes the result of using 64-bit integers instead of 32-bit integers? a. 2 times as many values can be represented. 32 times as many values can be represented. 2^32 times as many values can be represented. 32^2 times as many values can be represented. I know the answer is 2^32 but can someone explain it to me?

Answers

Answer:

2³² times as many values that can be represented

Explanation:

A 64 bit register can hold 2⁶⁴ different values, while a 32 bit register can hold 2³² different addresses

Therefore, a 64 bit can represent 2⁶⁴ ÷ 2³² = 2³² times as many values as can be represented by 32-bit

Therefore, the 64 bit can represent 2³² times as many values that can be represented by a 32 bit integer

Which of these statements regarding real-time strategy games is true?
A.
They only allow one player to move at a time.
B.
They do not work well on tablets.
C.
They feature memorable characters.
D.
They do not work well on mobiles.
E.
They offer plenty of time for players to reflect.

Answers

Answer:

E

Explanation:

Answer:

e

Explanation:

The 60-watt light bulb has a 400 hour life expectency how much will it cost to operate during its time

Answers

Answer:

$2.40

Explanation:

the unit electricity bill is kilo watt hour.

The 60-watt light bulb has a 400 hour life expectency means it will consume

60×400/1000 = 24 KWh units of electricity. Let us suppose each unit of electricity costs is 10 cents.

Then 24×10 = 240 cents  = $2.40

Which is not the protocol?
(i)TCPAP
(ii) IPX/SPX
(lii) NETBIOS/NETBUI
(iv) Client​

Answers

Answer:

2. IPX/SPX

is not the protocol.

1) "Information systems are revolutionizing the way businesses function in the 21st century," Do you agree or disagree with this statement? Provide evidence to support your position, (2 points)​

Answers

Answer:

true

Explanation:

everything is computerized. banks, shopping, financial business records, ect

Other Questions
There are 10 marbles in a bag : 5 red and 5 blue she draws a marble from the bag at random. The marble is red. She put the marble back into the bag. What is the probability that next marble she draws at random is red ? Autism spectrum disorder refers to a broad range of conditionscharacterized by challenges with social skills, repetitivebehaviors, and speech and nonverbal communicationO TrueO False Ahmed doubled his savings, then deposited another hundred dollars. Let s represent the amount he originally had in savings. Which shows an expression to represent his current amount and the current value of his account if s = 80? StartFraction s Over 2 EndFraction + 100; when s = 80 the latest balance of Ahmed's savings is $140 2 s + 100; when s = 80 the latest balance of Ahmed's savings is $260 s squared + 80; when s = 80 the latest balance of Ahmed's savings is $6,480 s squared + 100; when s = 80 the latest balance of Ahmed's savings is $6,500 one again i really am bad at these The five-number summary suggests that about 75% of salons in Janesville have fewer than how many stylists employed? It says find the volume of the prism. In The Outsiders, how does the character of Cherry Valance help bring out Ponyboys character? Which of the following concepts refers to the idea that the power of government is spread across three different branches, each with a different role in governing? What was the party in power before Jefferson assumed the presidency? What was Jeffersons Party? What is a basic difference between these two parties? Wesson Company uses the allowance method to record its expected credit losses. It estimates its losses at one percent of credit sales, which were $750,000 during the year. The Accounts Receivable balance was $220,000 and the Allowance for Doubtful Accounts has a credit balance of $1,000 at year-end. What amount is the debit to the Bad Debts Expense what is memory? explain types of memory? Find the area of this parallelogram. Be sure to include the correct unit in your answer. A surveyor leaves her base camp and drives 43kmon a bearing of 032 degrees. She then drives 28kmon a bearing of 154 degrees. How far is she thenfrom her base camp and what is her bearing fromit? Examine the following sequence 1, 4, 9, 16, 25. Why is 36 the next number in the sequence? Because the pattern is:a.Add the next even numberc.Cube the number of the term, nb.Square the number of the term, nd.Add 2 + the number of the term, nPlease select the best answer from the choices providedABCD what is the benefit of cooking food to break down dietary fiber? A. enhance appearance B. enhance taste C. increases digestibility D. increases nutrition E. increases shelf life 6. Everyone in Squidward's family has light blue skin, which is thedominant trait for body color in his hometown of Squid Valley. Hisfamily brags that they are a "purebred line. He recently marrieda nice girl who has light green skin, which is a recessive trait.Create a Punnett square to show the possibilities that would resultif Squidward and his new bride had children. Use B to representthe dominant gene and b to represent the recessive gene.A. List the possible genotypes and phenotypes for theirchildren. For each Situation Find the Sample Space Tossing a coin and spinning a spinner to the right spineer goes up to 5 Easy Q Peer CounselingWhat is one thing you wished more people understood about you?pls and thx help it is due tomorrow morning who ruled india after the mughal empire