what are the parts system unit​

Answers

Answer 1

Explanation:

there are 6 main system unit components:

motherboard

processor

RAM

hard drive

video card

power supply.


Related Questions

Define technical writing. The proposal introduces the ……. (5 Mark)

a) Results b) Objectives c) Researcher d) None of the previous

Answers

Answer:

B.objective

#carryonlearning

Can someone help me do this who ever does it first get 100 points :)

Answers

Answer:

Wired: Means a cable or a wire connected thats the opposite of wireless.

Wireless is bascially a device with no cable needed.

3G: GB

4G: GB

5G: GB

Explanation:

Wired: Means a cable or a wire connected thats the opposite of wireless.

Wireless is bascially a device with no cable needed.

3G: GB

4G: GB

5G: GB

Here’s my last question

Answers

Answer:

Can't find it lolol

Explanation:

Where?

I’m bored too … hey

Write a program that:
a) Inputs TWO numbers and finds the average of both numbers, only if BOTH numbers are less than 100

Answers

Answer:

num1 = int(input("Enter number 1: "))

num2 = int(input("Enter number 2: "))

if num1 < 100 and num2 < 100:

   newnum = num1 + num2

   finalnum = newnum // 2

elif num1 >= 100 or num2 >= 100:

   print("Invalid input.")

else:

   pass

Explanation:

Gg ez.

(I assumed the language was python. Next time, put what programming language you want it to be in.)

What is the new programming language for developing iOS and Mac app

Answers

Answer:

Swift

Explanation:

I'm not sure about new, but IOS developers have been using Swift ever since the begining of time!

Which cloud computing model allows users to create their own applications given a specific set of tools

Answers

I believe Windows or Apple computers. Sorry if I’m not helpful.

Questions Description Explain how you will identify and use texts according to the function you wish for it to serve in the particular industry​

Answers

The texts have different purposes that can be identified with the following tips:

Identify the main ideas. Identify the author's purpose.

What is a text?

A text is a term to refer to the set of phrases and words ordered coherently to be interpreted and to transmit the ideas of an author (emitter or speaker).

Texts can have a variety of topics depending on the author's intention. For example:

Scientific texts: They are the texts that have the purpose of sharing scientific information with exact data and results of experiments or others. Literary texts: They are the best known texts that stand out for including a diversity of topics, they are characterized by telling an in-depth story. News texts: They are the texts that expose all the details of a news story and have the purpose of objectively reporting.

According to the above, to identify a text it is necessary to read it and identify the main ideas and the purpose of its author when writing it. Additionally, the texts are tools for different professions to teach skills, knowledge and techniques depending on the requirement.

Learn more about text in: https://brainly.com/question/1142673

Briefly explain the Conleptual model 044
effective computer Based instruction
for adult outlining the three units
(output, process, input)

Answers

According to computer analysis, the concept of effective computer-based instruction for adults is the embedment of the fundamental parts of computer-based instruction to provide the expected stratagems for inquiry in CBI for adults.

The three (3) units output, process, and input

Output in CBI External supportCBI DesignInstructional Strategy design

Process in CBISelf DirectednessComputer Self EfficacyLearning Goal Level

Output in CBILearning OutcomeScreen DesignPractice Strategy

Hence, in this case, it is concluded that computer-based instructions can be effective for adult learning.

Learn more about Computer Based Instructions here: brainly.com/question/15697793

Making data secure means keeping it secret

Answers

Answer:

Data security refers to the process of protecting data from unauthorized access and data corruption throughout its lifecycle. Data security includes data encryption, hashing, tokenization, and key management practices that protect data across all applications and platforms.


Which source would provide the best way to find valid information about climate change

Answers

Primary sources would be best

The primary source would provide the best way to find valid information about climate change.

What is Climate change?

Climate change may be defined as the change in the average conditions such as temperature and rainfall in a region over a long period of time. In more simple words, climate change refers to the long-term shifts in temperatures and weather patterns.

The burning of fossil fuels like coal, oil, and gas for electricity, heat, and transportation is the primary source of human-generated emissions. A second major source is a deforestation, which releases sequestered (or stored) carbon into the air.

Both of these sources are significantly responsible for the causation of climate change in the specific region over a long period of time.

Therefore, the primary source would provide the best way to find valid information about climate change.

To learn more about Climate change, refer to the link:

https://brainly.com/question/24793273

#SPJ2

What should you look out for when choosing snacks that seem healthy? How can you make sure that the snacks you are choosing are actually healthy?

Answers

Answer:

You can make sure that the snack is healthy by looking at the ingreadents. A healthy snack should not have alot of persavatives and sugars. A good golden rule is if you can't pronaunce the word then its not good for you.

Explanation:

conclusion for project for computer​

Answers

OK this question is answer easy the computer important of future

5. What is intellectual property? (1 point)
Brainliest if correct

Answers

Answer:

intangible property that is the result of creativity, such as patents, copyrights, etc.

Please mark as brainliest

Answer:

A creative work of an invention, designs or names and images used in commerce.

Tumblr, Jaiku is an example of _____________ website.
a) Microblogging
b) Blogging
c) Social Networking
d) None of the Above​

Answers

Answer:

Microblogging

One of the best-known channels in the microblogging world. Twitter is a quick and convenient way to share short posts, GIFs, article links, videos and more. Pinterest: Companies on Pinterest link to products, articles and other useful information for audiences .

Explanation:

Hope this helps you !!

different types of programming languages​

Answers

the main types are machine language, assembly language and high level language

Answer:

At the time of writing, some of the top programming languages include: 

C

Java 

Python

C++

C# 

Visual Basic 

JavaScript

PHP

SQL

Assembly language

R

Groovy 

Role and responsibility of an IT professional

Answers

create the computer, network, and communication systems that an organization needs


Type the correct answer in the box

How is it possible to understand the flow of data in an organization?

Conducting ______ with each team member makes it possible to understand the flow of data in an organization.

Answers

Data ?? I think sorry if wrong ..

Type the correct answer in each box. Spell all words correctly, and use numerals instead of words for numbers. If necessary, use / for the fraction bar(s). What is the hexadecimal equivalent of the decimal number 125.28? The hexadecimal equivalent of the decimal number 125.28 is

Answers

Answer:

125.28₁₀ in hexadecimal = 7D.47AE147AE1₁₆

Step-by-Step Explanation:

To convert decimal number 125.28, we convert its integer and fraction part individually and then add them to get the equivalent hexadecimal number, as below:

To convert integer 125 to hexadecimal, follow these steps:

Divide 125 by 16 keeping notice of the quotient and the remainder. Continue dividing the quotient by 2 until you get a quotient of zero.

Then just write out the remainders in the reverse order to get the equivalent hexadecimal number.

125 / 16 = 7 with remainder 13 (D)

7 / 16 = 0 with remainder 7

Here is the answer to 125 decimal to hexadecimal number:

7D

For converting decimal fraction 0.28 to hexadecimal number, follow these steps:

Multiply 0.28 by 16 keeping notice of the resulting integer and fractional part. Continue multiplying by 16 until you get a resulting fractional part equal to zero (we calcuclate upto ten digits).

Then just write out the integer parts from the results of each multiplication to get equivalent hexadecimal number.

0.28 × 16 = 4 + 0.48

0.48 × 16 = 7 + 0.68000000000001

0.68000000000001 × 16 = 10 (A) + 0.88000000000011

0.88000000000011 × 16 = 14 (E) + 0.080000000001746

0.080000000001746 × 16 = 1 + 0.28000000002794

0.28000000002794 × 16 = 4 + 0.48000000044703

0.48000000044703 × 16 = 7 + 0.68000000715256

0.68000000715256 × 16 = 10 (A) + 0.88000011444092

0.88000011444092 × 16 = 14 (E) + 0.080001831054688

0.080001831054688 × 16 = 1 + 0.280029296875

Here is the answer to 0.28 decimal to hexadecimal number:

0.47AE147AE1

Therefore, decimal number 125.28 converted to hexadecimal is equal:

7D.47AE147AE1

Which part of the computer is responsible for managing memory allocation for all applications


A. Word processor


B. Operating system


C. Web browser


D. Intergrated development environment


I think it’s B but I’m not sure so I want to see if I’m right before answering

Answers

Answer:

Option B

Explanation:

The operating system is the type of software that is responsible for managing the processor time and also the memory allocation in the system. The operating system mainldeals with the processor time by scheduling the processor work done in the system.

The OS mainly controls the system and then schedule the execution of various types of function by the central processing unit (CPU). It also controls the memory allocation in the system.

The part of the computer responsible for managing memory allocation for all applications is the operating system. The correct option is B.

What is an operating system?

The operating system is the kind of software in charge of controlling the system's memory allocation and CPU usage. By scheduling the system's processor work, the operating system primarily manages processor time.

The operating system (OS) primarily manages the system and schedules the central processor unit's performance of many types of functions. Additionally, it manages the system's memory allocation.

The CPU is the brain of the computer. It manages all the functions of the computer. It is a small rectangle chip-like structure present inside the box with other parts.

Thus, the part of the computer that is responsible for managing memory is the operating system. The correct option is B.

To learn more about the operating system, refer to the link:

https://brainly.com/question/6689423

#SPJ2

A wireless ________ extender is a network device that enhances transmission of your wireless signal.

Answers

Explanation:

A wifi range extender,sometime called a range expander,is type of wireless repeater used to exten wifi range.

Which bits of the address would be used in the tag, index and offset in a two-way set associative cache with 1-word blocks and a total capacity of 512 words

Answers

size of block = 1 word = 8 bytes

number of blocks = size of cache / size of word

= 512 word /1 word = 512 blocks

In a two-way set associative cache, 2 blocks will form 1 set. So number of index = 512/2=256=2^8

Size of offset = 3 bits

size of index = 8 bits

Size of tag = 64-11=53 bits

What is information technology in relation to computers

Answers

Answer:

Information technology (IT) is the use of any computers, storage, networking and other physical devices, infrastructure and processes to create, process, store, secure and exchange all forms of electronic data. ... The commercial use of IT encompasses both computer technology and telecommunications.

Answer:

Information technology (IT) is the use of any computers, storage, networking and other physical devices, infrastructure and processes to create, process, store, secure and exchange all forms of electronic data.

Explanation:

Hope this helps

Get the user to enter some text and print it out in reverse order.

Answers

Answer:

strrev in c/c++

Explanation:

Building a String Library

Sometimes when programming you need to introduce a new data type and develop a library of functions for manipulating instances of that data type. Often this is done as methods on a new class but not always.

In this assignment, you'll be defining a collection of functions on strings, most of which already exist as methods on the str class. However, you should pretend that they don't already exist and define them as functions. Of course, you can't just use the existing methods. This will give you a bunch of practice on manipulating strings and also on defining functions.

In this assignment, you'll be defining a collection of functions on strings. You should define each of these as a new function with a function header as below. The description of each is in the comment supplied. Recall that strings are immutable, so you will have to return a new copy of the string for those that call for you to return a string. If you are returning the same string as the input, just return it; there is no need to make a new copy, and it wouldn't anyway.

The only string functions/methods to use:

ord, chr
indexing and slicing
append (i.e., ``+'')
len, in, not in
equality comparison (== or !=))
Looping over strings (while or for loops) and selection (if statements) are allowed. BUT You cannot convert the strings to other types such as lists.

Define each of the following functions, with semantics as indicated by the comment. In each of the following ch is a single character, str, str1, str2 are strings, and i is a non-negative integer. You do not have to validate the inputs, except as indicated; you can assume these types.

At least one question asks you to return two values. That really means returning a tuple (pair) of values. You do that as follows:

return value1, value2
This actually returns the pair (value1, value2). The caller can then assign the members of the pair to two variables:

x, y = pairReturningFunction() # assumes function returns a pair
z, w = (value1, value2) # assigning a tuple to 2 variables
If you like, you can use earlier functions in later ones, or define helper functions, though it shouldn't really be necessary. Note that some of these are trivial to write, while others are a bit harder. I have done the first one for you.

def myAppend( str, ch ):
# Return a new string that is like str but with
# character ch added at the end
return str + ch

def myCount( str, ch ):
# Return the number of times character ch appears
# in str.

def myExtend( str1, str2 ):
# Return a new string that contains the elements of
# str1 followed by the elements of str2, in the same
# order they appear in str2.

def myMin( str ):
# Return the character in str with the lowest ASCII code.
# If str is empty, print "Empty string: no min value"
# and return None.

def myInsert( str, i, ch ):
# Return a new string like str except that ch has been
# inserted at the ith position. I.e., the string is now
# one character longer than before. Print "Invalid index" if
# i is greater than the length of str and return None.

def myPop( str, i ):
# Return two results:
# 1. a new string that is like str but with the ith
# element removed;
# 2. the value that was removed.
# Print "Invalid index" if i is greater than or
# equal to len(str), and return str unchanged and None

def myFind( str, ch ):
# Return the index of the first (leftmost) occurrence of
# ch in str, if any. Return -1 if ch does not occur in str.

def myRFind( str, ch ):
# Return the index of the last (rightmost) occurrence of
# ch in str, if any. Return -1 if ch does not occur in str.

def myRemove( str, ch ):
# Return a new string with the first occurrence of ch
# removed. If there is none, return str.

def myRemoveAll( str, ch ):
# Return a new string with all occurrences of ch.
# removed. If there are none, return str.

def myReverse( str ):
# Return a new string like str but with the characters
# in the reverse order.
Expected output:

>>> from MyStringFunctions import *
>>> s1 = "abcd"
>>> s2 = "efgh"
>>> myAppend( s1, "e" )
'abcde'
>>> myCount( s1, "e")
0
>>> myCount( s1, "a")
1
>>> myCount( "abcabc", "a")
2
>>> myExtend( s1, s2 )
'abcdefgh'
>>> myMin( "" )
Empty string: no min value # Note the None doesn't print
>>> myMin( "zqralm" )
'a'
>>> myMin( "Hello World!" )
' '
>>> myInsert( "abc", 0, "d")
'dabc'
>>> myInsert( "abc", 2, "d")
'abdc'
>>> myInsert( "abc", 4, "d")
Invalid index # Note the None doesn't print
>>> myPop( "abcd", 1 )
('acd', 'b')
>>> myPop( "abcd", 0 )
('bcd', 'a')
>>> myPop( "abcd", 5)
Invalid index
('abcd', None)
>>> myFind( "abcdabcd", "a")
0
>>> myFind( "abcdabcd", "c")
2
>>> myFind( "abcdabcd", "f")
-1
>>> myRFind("abcdabcd", "d")
7
>>> myRFind("abcdabcd", "e")
-1
>>> myRemove( "abcdabcd", "a")
'bcdabcd'
>>> myRemove( "abcdabcd", "x")
'abcdabcd'
>>> myRemove( "abcdabcd", "d")
'abcabcd'
>>> myRemoveAll("abcabcabca", "a")
'bcbcbc'
>>> myReverse( "abcd" )
'dcba'
>>> myReverse( "" )
''

Answers

Code:

def myAppend( str, ch ):
# Return a new string that is like str but with
# character ch added at the end
return str + ch

def myCount( str, ch ):
# Return the number of times character ch appears
# in str.

# initiaalizing count with 0
count = 0

# iterating over every characters present in str
for character in str:
# incrementing count by 1 if character == ch
if character == ch:
count += 1

# returning count
return count


def myExtend( str1, str2 ):
# Return a new string that contains the elements of
# str1 followed by the elements of str2, in the same
# order they appear in str2.

# concatenating both strings and returning its result
return str1 + str2

def myMin( str ):
# Return the character in str with the lowest ASCII code.

# If str is empty, print "Empty string: no min value"
# and return None.
if str == "":
print("Empty string: no min value")
return None

# storing first character from str in char
char = str[0]

# iterating over every characters present in str
for character in str:
# if current character is lower than char then
# assigning char with current character
if character < char:
char = character
# returning char
return char


def myInsert( str, i, ch ):
# Return a new string like str except that ch has been
# inserted at the ith position. I.e., the string is now
# one character longer than before.

# Print "Invalid index" if
# i is greater than the length of str and return None.

if i > len(str):
print("Invalid index")
return None

# str[:i] gives substring starting from 0 and upto ith position
# str[i:] gives substring starting from i and till last position
# returning the concatenated result of all three
return str[:i]+ch+str[i:]

def myPop( str, i ):
# Return two results:
# 1. a new string that is like str but with the ith
# element removed;
# 2. the value that was removed.
# Print "Invalid index" if i is greater than or
# equal to len(str), and return str unchanged and None
if i >= len(str):
print("Invalid index")
return str, None

# finding new string without ith character
new_str = str[:i] + str[i+1:]

# returning new_str and popped character
return new_str, str[i]

def myFind( str, ch ):
# Return the index of the first (leftmost) occurrence of
# ch in str, if any. Return -1 if ch does not occur in str.

# finding length of the string
length = len(str)

# iterating over every characters present in str
for i in range(length):
# returning position i at which character was found
if str[i]==ch:
return i
# returning -1 otherwise
return -1


def myRFind( str, ch ):
# Return the index of the last (rightmost) occurrence of
# ch in str, if any. Return -1 if ch does not occur in str.

# finding length of the string
length = len(str)

# iterating over every characters present in str from right side
for i in range(length-1, 0, -1):
# returning position i at which character was found
if str[i]==ch:
return i
# returning -1 otherwise
return -1

def myRemove( str, ch ):
# Return a new string with the first occurrence of ch
# removed. If there is none, return str.

# returning str if ch is not present in str
if ch not in str:
return str

# finding position of first occurence of ch in str
pos = 0

for char in str:
# stopping loop if both character matches
if char == ch:
break
# incrementing pos by 1
pos += 1

# returning strig excluding first occurence of ch
return str[:pos] + str[pos+1:]

def myRemoveAll( str, ch ):
# Return a new string with all occurrences of ch.
# removed. If there are none, return str.

# creating an empty string
string = ""

# iterating over each and every character of str
for char in str:
# if char is not matching with ch then adding it to string
if char!=ch:
string += char
# returning string
return string

def myReverse( str ):
# Return a new string like str but with the characters
# in the reverse order.

return str[::-1]

True or False. The 'C' programming language guarantees that R0 will always contain a zero value on the ATmega328P

Answers

Oh I had this question once and I think it was true!! Hope this helps! Merry Christmas!!

Which of the four factors of production are hit the hardest when high unemployment occurs ?

Answers

Answer:

Economic growth,cyclical and structural factors, demographics, education and training

Explanation:

.........

Shell Scripting:

In the following statement, X is the initial value:

for (( X = N; X <= Y; X++ ))
True or False

Answers

True because if x sucks x then Y will spill juice cream team juice what how ….its true.

Shell scripts are most useful for repetitive tasks that would take a long time to accomplish if entered one line at a time. A few examples of uses for shell scripts are as follows: automating the process of code compilation. Programming or setting up a programming environment. Thus, it is true.

What role of Shell Scripting in programming?

You can access the Unix system through a Shell. It leverages the input you provide to execute programs. Once a program has finished running, its output is shown. In the shell environment, we may run our commands, applications, and shell scripts.

Programmers do not need to switch to a completely other syntax because the command and syntax are precisely the same as those placed directly on the command line.

Therefore, it is true that Shell scripts may be created considerably more quickly. Rapid start interactive bug-fixing.

Learn more about Shell Scripting here:

https://brainly.com/question/29625476

#SPJ2

Write a program that asks the user for his or her name, then asks the user to enter a sentence that describes himself or herself. The program should ask for a destination file to save as the last question.

Answers

Answer:

there was a type of user name and sentences

Write an if statement that assigns 0.2 to commission if sales is greater than or equal to 10000.

Answers

if (sales >= 10000)
commission = 0.2;

Which of the following is not an Error Style for data validation?

Answers

Based on the Microsoft Excel data validation, the option that is not an Error Style for data validation is the choice that does not show an error alert.

Given that there is no option available, the best way to answer this question is to show the types of Error Styles for data validation available.

Different types of Error Style for data validationStop style: this will bring the option of "Retry, " "Cancel, " and "Help."

Warning style: this will show "Continue," with options of "Yes," "No," "Cancel," and "Help."

Information Style: this will ask you to input the whole number with the option of "Ok," "Cancel," and "Help."

Hence, in this case, it is concluded that the Error Style for data validation is Stop, Warning, and Information Style.

Learn more about Error Style for data validation here: https://brainly.com/question/18497347

Other Questions
Cocinamos y comemos en Who is the first king of Nepal? What is the purpose of an indicator in a titration. can someone save my grade and clutch im so behind rn yall At a glass vase factory, 2 out of the last 10 vases produced were chipped. What is the experimental probability that the next vase will be chipped? Use this dictionary entry to answer the question. capt. (core root) take; seize What does the word captivated mean as it is used in this sentence? The play captivated me; I felt transported to another place and time. a statement that is made by a captain unable to make someone understand kidnapped or taken against one's will held a person's attention completely A 9-foot roll of waxed paper costs $4.32. What is the price per inch? Which of the following best describes the mostimmediate effect of the EmancipationProclamation?(A) The outbreak of the Civil War(B) The passage of the 13'h Amendment(C) The freeing of enslaved people held inborder states(D) The strengthening of the moral cause of theUnion Excerpt from Run with the Horseman Ferrol Sams The family was poor. It was "poor but proud." The confused boy grew up thinking one should be proud of being poor. One of the in-laws slipped around occasionally and made liquor. He had plenty of cash, did not read books, and was tolerated but not admired. A cousin had surrendered to the boll weevil, moved out of the county, and bought Coca-Cola stock. He was rich, but there was unspoken disdain for him because he had left the land. The grandparents told horror stories of having to boil dirt from under the smokehouse to retrieve salt after the Yankees had been on the land. They had learned to eat a weed called poke salad as a means of survival in those days, a custom that they passed on as a springtime ritual of communion to their descendants. Things apparently got a little better for awhile, but then the Great Depression hit the South like aftershock from the earthquake of Reconstruction, and the children knew poverty firsthand. They also, however, knew pride. No one in the county had any money to spend, and there was a security of blood that transcended the possession of material things. When one is convinced that one is to the manor born, the actual physical condition of the manor itself is of negligible importance. Which best expresses the irony present in this passage? A) It is ironic that the family is poor, yet still is proud. B) It is ironic that one of the in-laws in the family slipped around occasionally and made liquor. C) It is ironic that one of the boy's relatives had moved out of the county, bought Coca-Cola stock, and become rich. D) It is ironic that they boy's family had learned to eat a weed called poke salad as a means of survival after the Civil War A textbook store sold a combined total of 272 biology and math textbooks in a week. The number of math textbooks sold was 50 less than the number of biology textbooks sold. How many textbooks of each type were sold? Number of biology textbooks sold: number of math textbooks sold: Prism A and Prism B have the same volume. Which could be the dimensions of Prism B?Prism A:length = 8 feet width = 4 feetheight = 5 feet Prism B:length=? feetwidth=? feet height=? feet what was the impact of the use of machine guns and barbed wire during world war i? Which energy technology is more sustainable long term? At a school, 40% of the sixth-grade students said that hip-hop is their favorite kind of music. If 100 sixth-grade students prefer hip hop music, how many sixth-grade students are at the school? Explain or show your reasoning. The Viet (or Kinh) have______ number of people, account for about 86% of the population. a.largeb.the largec.largerd.the largest 1.How do speices interact in nature?2.How do energy and nutrients move through communities?3. How do communities respond to a disturbance? if 4.5 pounds of cherries cost $10 , what is the unit price per pound ? A.$0.22 B.$0.45 C. $2.22 Which two states entered the Union in 1890? Geologists study the density of seismic activity in a region by comparing the number of earthquakes to the area of the region. The seismic activity density of a region is found using the formula: seismic activity density = StartFraction number of earthquakes Over area of land affected EndFraction. The state of California covers approximately 103,718 mi2, and has a seismic activity density of 0. 0964 earthquakes per square mile. The state of Alaska covers approximately 570,641 mi2, and has a seismic activity density of 0. 491. Using this data and rounding to the nearest whole number, Alaska had more earthquakes than California for the year. Why would the seismic activity density of the year for Alaska be smaller than for California if Alaska had more earthquakes?. Cheryl writes 7 fewer posts than Kevin on a social media site.If k represents kevin how would you write the expression