The CPU is responsible for?

Answers

Answer 1

The CPU (Central Processing Unit) is the part of a computer system that is commonly referred to as the "brains" of a computer. The CPU is also known as the processor or microprocessor. The CPU is responsible for executing a sequence of stored instructions called a program .


Related Questions

Travis just got promoted to network administrator after the previous administrator left rather abruptly. There are three new hires that need onboarding with user accounts. When Travis looks at all the existing account names, he notices there is no common naming system. Where should he look to try to give the new hires user accounts with proper naming conventions

Answers

Answer:

The company's account policy

Explanation:

If there's no common naming system, It's best to go with the company's account policy.

this help me please. ​

Answers

Answer:

1) 1011010

2) 1100100

3) 1010101

4) 23

5) 22

6) 24

PLEASE HELP DUE!!!
WILL GIVE BRAINLIEST!!

can someone help me please?

Answers

Answer:

see below picture

Explanation:

You can work your way through the formula from the inside out, mapping every operation to a gate.

What are the advantages of Radio waves over micro waves?​

Answers

Answer:

radio frequencies can penetrate deeply into the material and thus heat thick products. They heat more slowly than microwaves and thus make it possible to treat more delicate products which require a slower heating.

8. Compare the advantages and disadvantages of using a smartphone rather than a laptop computer for creating a report.​

Answers

Answer: the advantage of using a smartphone rather than a laptop computer is that you can talk to people across the world, call people, make texts, and get easy access to the internet. but the disadvantages are that a lot of people stay inside their house because of phones, not getting enough exercise.

Explanation:

The advantages and disadvantages of using a smartphone rather than a laptop computer for creating a report. have been compared below.

The advantages of using a smartphone rather than a laptop computer are;

Portability; Smartphones are portable enough that they can fit into pockets and some purses and as such can be taken with you anywhere easily unlike a laptop computer that doesn't have such physical property.Cost; Smartphones are largely cheaper than the average laptop computer. Thus, cost is a good factor.

Disadvantages of using a smartphone rather than a laptop computer are;

Screen size; Smartphone screen size are always smaller than that of laptop computers .Software's; Smartphones can't run many of the type of powerful software's that can run on laptop computers.Data entry and user input; Due to the portability of smartphones, their keyboards are usually smaller than that of laptop desktops which makes data entry more difficult for those that have big fingers.

Read more about smartphones and laptops at; https://brainly.com/question/21283135

Which computer can be used where there is no regular electricity?​

Answers

Answer:

A mechanical computer

Explanation:

Created from gears and levers

Plz help help help


What was the first electromechanical digital computer?

For your kind information I would like to tell you that don't search on internet because it will show ENIAC and that is not the answer the answeris may be ABC or MARK I. I am just confused, Please help me

Answers

Explanation:

For your kind information the answer of the question is MARK I.

Answer:

What was the first electromechanical digital computer?

=⟩ Mark I was the first electromechanical digital computer.

Hope it helpful to you

Write a program to input the TotalCost and display the Assured gift as per the following criteria TotalCost(TC) Assured Gift Less than or up to 2000 Wall Clock 32001 to 5000 School Bag 5001 to 10,000 Electric Iron More than 10,000 Wrist Watch​

Answers

Answer:

The program in Python is as follows:

TotalCost = int(input("Total cost: "))

if TotalCost <= 2000:

   print("Wall Clock")

elif TotalCost >= 2001 and TotalCost <= 5000:

   print("School Bag")

elif TotalCost >= 5001 and TotalCost <= 10000:

   print("Electric Iron")

else:

   print("Wrist Watch")

Explanation:

This gets input for total cost

TotalCost = int(input("Total cost: "))

If the total cost is up to 2000, print wall clock as the assured gift

if TotalCost <= 2000:

   print("Wall Clock")

If the total cost is between 2001 and 5000 (inclusive), print school bag as the assured gift

elif TotalCost >= 2001 and TotalCost <= 5000:

   print("School Bag")

If the total cost is between 5001 and 10000 (inclusive), print electric iron as the assured gift

elif TotalCost >= 5001 and TotalCost <= 10000:

   print("Electric Iron")

If the total cost is more than 10000, print wrist watch as the assured gift

else:

   print("Wrist Watch")

You are in charge of installing a remote access solution for your network. You decide you need a total of four
remote access servers to service all remote clients. Because remote clients might connect to any of the four
servers, you decide that each remote access server must enforce the exact same policies. You anticipate that
the policies will change frequently.
What should you do? (Select two. Each choice is a required part of the solution.)
A. Configure network policies on the RADIUS server.
B. Make each remote access server a member of the RemoteServers group.
C. Configure the exact same network policies on each server.
D. Configure one of the remote access servers as a RADIUS server, and all other servers as RADIUS clients.
E. Use Group Policy to configure network policies in the default Domain Controllers GPO.
F. Configure each remote access server as a domain controller.

Answers

Answer: configure one of the remote access servers as a RADIUS server and all other servers as RADIUS clients

configure network access policies on the RADIUS server

Explanation:

You are concerned that if a private key is lost, all documents encrypted using your private key will be inaccessible. Which service should you use to solve this problem

Answers

Answer:

Key escrow.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

In Cyber security, encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext.

Typically, an information or data that has been encrypted can only be accessed and deciphered by an authorized user.

Hence, if a private key is lost, all documents encrypted using that private key will be inaccessible to the users. Thus, the service that can be used to solve this problem is a key escrow because the cryptographic (private) keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

is computers takes lots of time to do any mathematical calculations.​

Answers

Answer:

I think the answer is a computer take lost of time to do any mathematical calculations because problem in the book or questions.

Hope this helps you ^^

Abdullah wants to send sessitive data. Abdullah wants to make sure that only ahmed can see and read this. How can abdullah protect this data, so that ahmed can only access it. By using this information make an algorithm.

Answers

Answer:

Use an encryption algorithm

Explanation:

An encryption algorithm can be used to hide the message from parties in-between or any third parties that might want to intercept the message being sent by Abudullah to Ahmed.

Encryption algorithms use cryptographic methods to encrypt or code data such that only the sender and receiver of that data have the keys to properly decode/decrypt these messages/data.

Which of these is NOT an input device?
O keyboard
O mouse
O blinking light
O microphone

Answers

Blinking light is not one of the awansers

A logistics company's vulnerability scan identifies the following vulnerabilities on Internet-facing devices in
the DMZ: SQL injection on an infrequently used web server that provides files to vendors SSL/TLS not used for a website that contains promotional information
The scan also shows the following vulnerabilities on internal resources: Microsoft Office Remote Code Execution on test server for a human resources system
TLS downgrade vulnerability on a server in a development network In order of risk, which of the following should be patched FIRST?
A. Microsoft Office Remote Code Execution
B. SQL injection
C. SSL/TLS not used
D. TLS downgrade

Answers

Answer:

A. Microsoft Office Remote Code Execution

Explanation:

From the given options, we have;

The web server having a SQL injection is infrequently use

The information on the website having SSL/TLS not used is promotional

The location of the server having  a TLS downgrade is on a development network

The location of the Microsoft Office Remote Code Execution is on a human resource system test server

Therefore, given that the test server, is the deployment source of the main server, and that with a Remote Code Execution, RCE,  cyber attack, the attacker is able to make commands work on other computers, the RCE attack on the test server is a potential access of an attack on the main servers, and should be patched first.

Other Questions
Determine which of the following statements is true about energy in ecosystems. A. Producers are able to convert 40% of the suns energy into chemical energy. B. 30% of the suns energy cannot be absorbed by producers because it is in the wrong wavelength of light. C. Producers only absorb 40% of the suns energy, most of which is lost during photosynthesis. D. Producers absorb 5% of the suns energy, and reflect 5% of the suns energy. A shunt regulator utilizing a zener diode with an incremental resistance of 8 ohm is fed through an 82-Ohm resistor. If the raw supply changes by 1.0 V, what is the correspondig change in the regulated outut voltage? cobtxedready.org/assessment/retakeUnitPassessmentid=68643&groupid=91593&studyPlanUnitid=10528185&continuerUnit: Introduction to College Reading and WritingProgressQuestion DOS328The movement of the progress bor may be uneven because questions can be worth more or less (including zero, depending on your answerRead the following paragraph, which is missing a topic sentence:According to the "rare Earth hypothesis," the conditions that support life on Earth are unique, and the odds of similarconditions being found on another planet are close to zero. In contrast, the "mediocrity principle holds that our planet, solarsystem, and galaxy are utterly ordinary, making it likely that life is common elsewhere.Which is the most effective topic sentence for the paragraph?Have you ever looked up at the stars and wondered if anyone was out there looking back?Science fiction assumes that the universe bursts with life, but scientists aren't so sure.Despite many decades of searching with telescopes, space probes, and planetary rovers, we have found no evidence ofextraterrestrial life.There are two opposing viewpoints on the possibility of life existing on other planets. Consider a system with seven processes: E, F, G, H, I, J, K and six resources: U, V, W, X, Y, Z. Process E holds U and wants V. Process F holds nothing but wants W. Process G holds nothing but wants V. Process H holds X and wants V and W. Process I holds W and wants Y. Process J holds Z and wants V. Process K holds Y and wants X. Is this system deadlocked?a. Yesb. No The length of a rectangle is three times the width. The area of the rectangle is 108 sq. inches whats the triangles width? what is 8/9 divided 2/3 PLEASE HELP! NEED THIS ASAP!Read this passage from chapter 5 of The Prince.There are, for example, the Spartans and the Romans. The Spartans held Athens and Thebes, establishing there an oligarchy: nevertheless they lost them. The Romans, in order to hold Capua, Carthage, and Numantia, dismantled them, and did not lose them. They wished to hold Greece as the Spartans held it, making it free and permitting its laws, and did not succeed. So to hold it they were compelled to dismantle many cities in the country, for in truth there is no safe way to retain them otherwise than by ruining them. And he who becomes master of a city accustomed to freedom and does not destroy it, may expect to be destroyed by it, for in rebellion it has always the watchword of liberty and its ancient privileges as a rallying point, which neither time nor benefits will ever cause it to forget. And whatever you may do or provide against, they never forget that name or their privileges unless they are disunited or dispersed, but at every chance they immediately rally to them, as Pisa after the hundred years she had been held in bondage by the Florentines.What text evidence supports Machiavellis primary purpose to persuade readers that a conquering prince must destroy a former republic if he hopes to hold it? Select three options.A. the list of cities Rome and Sparta conqueredB. the portrayal of Greece as being held by SpartaC. the explanation of how Rome held Capua, Carthage, and NumantiaD. the description of liberty as a rallying cry for rebellion in former republicsE. the example of the Florentines losing control over Pisa Is there bias in the Pearl Harbor speech? Where is this bias found? Thank you!! Essie is an 86-year-old woman who tries to function independently but has suffered for several years with forgetfulness, especially with recent memories. She has trouble finding her car in the parking lot after grocery shopping. The store managers have called her children to come and help her. She has been known to forget her way home at times. Her children worry that she may have a form of dementia called ________. can u plz solve it n send the answer Explain why ancient Egypt's rulers had more authority than most rulers today Read the scenario below and answer the question that follows.Brandon and Richard are experiencing an intense conflict over a loan. Brandon tells many of his friends that Richard is greedy.Based on mirror-image perceptions, how is Richard likely to describe Brandon?as greedyas cleveras evilas rude Question 27 (1 point)In lines 12 to 13, "that 'citadel / of learning' "refers to an environment that is- political- religious- academic- military Explain create jobs in rural areas Operating Leverage Beck Inc. and Bryant Inc. have the following operating data: Beck Inc. Bryant Inc. Sales $1,250,000 $2,000,000 Variable costs (750,000) (1,250,000) Contribution margin $500,000 $750,000 Fixed costs (400,000) (450,000) Operating income $100,000 $300,000 a. Compute the operating leverage for Beck Inc. and Bryant Inc. If required, round to one decimal place. Beck Inc. fill in the blank 1 Bryant Inc. fill in the blank 2 b. How much would operating income increase for each company if the sales of each increased by 20%? Dollars Percentage Beck Inc. $fill in the blank 3 fill in the blank 4 % Bryant Inc. $fill in the blank 5 fill in the blank 6 % c. The difference in the of operating income is due to the gi s bn l i trng ca khoa tham gia gii sinh vin khi nghip bn s p dng phong cach lnh o no? ti sao li chn phong cch Please hurry this is due tomorrow morning A student is studying the ways different elements are similar to one another. Diagrams ofatoms from four different elements are shown below.Which two atoms are of elements in the same group in the periodic table?F Atom 1 and Atom 2G Atom 1 and Atom 4 H Atom 2 and Atom 3J Atom 3 and Atom 4 Please help me find the nouns and adjectives for this passage satellite does not need any energy to revolve around the earth why A convertible preferred stock is convertible at $10, pays a 4% annual dividend, is callable at $110, and is trading at a current market price of $116. Based on these details, what is the parity price of the common stock