The need to upgrade which component would likely lead to replacing the computer?

The Need To Upgrade Which Component Would Likely Lead To Replacing The Computer?

Answers

Answer 1

Answer:

CPU

Explanation:

The CPU is essentially the brain of a CAD system soooo


Related Questions

Which portion of the Outlook interface contains commonly accessed commands that a user will require frequently
and is able to be customized by the user based on their particular needs?
Quick Access toolbar
ribbon and ribbon tabs
Tell me box
Title bar

Answers

Answer:

A

Explanation:

on edge 2021

Which programming language uses objects?
a. C++
b. ALGOL
c. Pascal
d. BASIC

Answers

So this is your answer hope this helps you
C++

C++, it's also used as code for video games, so it would make sense.

Buying the newest phone as soon as it is released when your current phone works perfectly is not a good idea for all but which of the following reasons?

Answers

Answer:

You are gonna waste money and it might not be the best idea

Explanation:

Answer:

waste money

Explanation:

Navigation buttons found on Web sites that might lead you to information about the Web site publishers are often labeled _____.


Shop

Index

What’s New

About Us

Answers

About us because what’s new would be about things that are new, index would be about a statistical measure, and shop would be to shop.

3. One advantage of online classrooms over physical classrooms is that:
A-You can usually take the classes on your own time.
B-It is easier to access class materials.
C-You can communicate with your teacher more effectively.

D-The quality of the teaching is usually better.


Answers

Answer:

c

Explanation:

You can communicate your teachers

what is a similarity and difference of email and bulletin board?​

Answers

you can use both to write and the different is one is mobile ..

it refers to the ability of different parts of a computer to work together as one. please answer this​

Answers

Multiseat o multipuesto,

How has the Internet expanded the reach of all of these types of media?

Answers

the Internet made it easier for us to find information or to communicate with one another.

In this assignment, you will use all of the graphics commands you have learned to create an animated scene. Your program should have a clear theme and tell a story. You may pick any school-appropriate theme that you like.

The program must include a minimum of:

5 circles
5 polygons
5 line commands
2 for loops
1 global variable
You may wish to use the standard code for simplegui graphics below:
In Python please.

Answers

I have attached pictures.

Hope this helps!

how does a USB flash drive get its files?

Answers

Answer:

The flash drive is inserted into a computer's USB port, or type-A USB connector. The USB connector communicates between the drive and the computer. The computer recognizes the drive as a separate hard drive, allowing users to move files from the computer's hard drive to the flash drive.

What is pseudo code?

Answers

Answer:

a notation resembling a simplified programming language, used in program design.

Explanation:

Pseudocode is an artificial and informal language that helps programmers develop algorithms. Pseudocode is a "text-based" detail (algorithmic) design tool. The rules of Pseudocode are reasonably straightforward. All statements showing "dependency" are to be indented. These include while, do, for, if, switch.

Select the correct category of cybersecurity described.

It prevents intruders from accessing, misusing, destroying, adapting, or improperly disclosing networks, network infrastructure, or the information contained within networks.

network security

information security

operational security

infrastructure security

Answers

Answer:

Network security

Explanation:

Network security is a category of cybersecurity that is related to the protection of the infrastructure of the computer network from unauthorized access and intrusion that may be from intended attack or from an expedient  program which may result in the modification, malfunctioning, misuse or unacceptable disclosure of the network and the contents of the network

The category of cybersecurity that 'prevents intruders from accessing, misusing, destroying, adapting, or improperly disclosing networks, network infrastructure, or the information contained within networks' is network security.

Answer:

network security

Explanation:

What is the value of creating recurring tasks?

makes task reminders more noticeable
makes task reminders more efficient
saves time spent manually creating multiple tasks
saves time spent manually configuring recurrence settings

Answers

Answer:

✔️saves time spent manually creating multiple tasks

Explanation:

I did it on edge

Answer:

saves time spent manually creating multiple tasks

Explanation:

it correct on edge 2021

Na2CO3 → Na2O + what

Answers

Answer:

CO3

Explanation:

Answer:

C02

Explanation:

A short-range wireless network is called:
cable modem
cell site
wi fi
personal digital assistant

Answers

Answer:

WiFi

Explanation:

WiFi can be defined as a wireless local area network that allows network devices such as access points (APs), computers (both laptops and desktops), smartphones, smart televisions, etc., to communicate with each other wirelessly over a short-ranged network. It is a standard communication network that uses radio waves to establish a channel (medium) between multiple network devices.

This ultimately implies that, the network range or distance covered by WiFi is largely dependent on transmission power and frequency. The standard range or distance covered by WiFi is about 50 meters (160 feet).

Hence, a short-range wireless network is called WiFi.

Read the following scenario, and then decide if you should upgrade the computer. You have a desktop that you use primarily for writing essays for school and browsing the web at home. The computer is slowing down some, so you check the date on it. Your computer is 6 years old. It is amazing that it lasted this long. You probably need a better CPU and more RAM. What should you do?

Answers

Answer:

Upgrade

Explanation:

EDGE 2021

Answer:

B. Upgrade

Explanation:

Because you have a desktop, upgrading the CPU and RAM are an easy and inexpensive fix. Upgrading a laptop is more difficult and often requires purchasing a new computer.

I hope this helps<3

Have a nice day everyone<3

How would our lives be different without computers at home?

Answers

Answer:

It would be so difficult to spend a life without computers. We would not be aware of technology or what things are being discovered. We could get information by newspaper, television, radio or some other medium but on computers.

Explanation:

Thanks for the points have a good day <3

What is a working model used to test a design called?

Answers

A working model used to test a design is a prototype.

Answer:

mockup is the working model

Which option is used in Access to locate and retrieve data that may be present in multiple database tables within the database?
queries

forms

procedures

Answers

Answer:

procedures

Explanation:

Answer:

themes

Explanation:

a flow chart is the _______ representation of the sequence of steps required of steps required to solve a particular problem​. I know answer I want how is it the answer

Answers

Answer:

A flowchart is simply a graphical representation of steps. It shows steps in sequential order and is widely used in presenting the flow of algorithms, workflow or processes. Typically, a flowchart shows the steps as boxes of various kinds, and their order by connecting them with arrows.

is willingness to be held accountable for your actions

Answers

Answer:

Responsibility.

Explanation:

Responsibility is the willingness to be held accountable for your actions.

A responsible person would always take measured and careful step or engage in well-thought-out actions that will add value to their lives and positively impact their immediate environment.

This ultimately implies that, responsibility is an individual characteristic which typically involves acting in a positive manner and owning up to any of your actions.

In a nutshell, responsibility requires that an individual does the right thing, the right way, at all times.

Which is the hanging indent on the rulern

Answers

Answer:

indent is a space between the red line.

Explanation:

what might be some challenges if you’re trying to design a product for someone

Answers

Answer:

failure

Explanation:

if someone dosnt like it

Failure,a picky person,time consumption if they can’t make up there kind,wasting time and money,

Huzaifa is a grade 5 student who is very enthusiastic to learn coding in computers. He asks his computer teacher to help him choose a language to code. Which level language will the teacher recommend Huzaifa?

Answers

Answer:

High level language.

Explanation:

High level language can be defined as a programming language which is generally less complex than a machine (low level) language and easy to understand by the end users (programmers).

This ultimately implies that, a high level programming language is typically a user friendly language and as such simplifies coding or programming for beginners.

Some examples of high level programming language are Python, Java, C#, Ruby, Perl, Visual Basic, PHP, Cobol, C++, Fortran, Javascript, etc.

In this scenario, Huzaifa is a grade 5 student who is very enthusiastic to learn coding in computers. He asks his computer teacher to help him choose a language to code. Thus, the language level the teacher will recommend to Huzaifa is a high level language.

Yes or no If the space is crowned make sure there are no white spaces​

Answers

Explanation:

huh??

I didn't understand

How does password encryption primarily protect a presentation?
O It prevents other users from saving the presentation.
O It restricts other users from opening the presentation.
O It restricts other users from emailing the presentation.
O It prevents other users from copyrighting the presentation.

The answer is B.) It restricts other users from opening the presentation.

Answers

if you have the answer why...

Answer: B: It restricts other users from opening the presentation.

Explanation: I just got it right

how should tools be stored

Answers

You should store tools in a storage or tool box

Stacy plans to print her contacts and would like to choose an option that will print select information for each contact in a business card format. Which option should she choose?

Small Booklet style
Medium Booklet style
Memo style
Card style

Answers

Answer:

D

Explanation:

did the quiz

Answer:

D: card style

Explanation:

just took the unit test on edge and made a 100%

What is binary ????????

Answers

Binary (or base-2) a numeric system that only uses two digits — 0 and 1. Computers operate in binary, meaning they store data and perform calculations using only zeros and ones. A single binary digit can only represent True (1) or False (0) in boolean logic.1. Binary is a base-2 number system invented by Gottfried Leibniz that is made up of only two numbers: 0 and 1. This number system is the basis for all binary code, which is used to write data such as the computer processor instructions used every day.

Answer:

it is a numeric system that only uses two digits 1 and 0, computers can operate using binary meaning they store data and perform calculations only using 0 and 1

what are the hardware and software components of a computer​

Answers

Answer:

I. Hardware components of a computer includes monitor, speaker, central processing unit, motherboard, hard-drive, joystick, mouse, keyboard, etc.

II. Software components of a computer includes operating system, registry keys, antivirus, media player, word processor, etc.

Explanation:

The hardware component of a computer can be defined as the physical parts or peripherals that enables it to work properly. Some examples of hardware components are monitor, speaker, central processing unit, motherboard, hard-drive, joystick, mouse, keyboard, etc.

A software component of a computer comprises of software application or program that are used by the computer to manage or control software application, computer hardware and user processes. Some examples of software components are operating system, registry keys, antivirus, media player, word processor, etc.

In conclusion, the hardware components of a computer are the physical parts that can be seen and touched while the software components cannot be touched but rather are installed as a program.

Other Questions
write the superlative degree of the words.Thin or Famous. Great Britain had provided trade, security and a great deal of independence to the colonies. Did the grievances of the Declaration of Independence justify the colonies in declaring their independence? Change 8.94 into a fraction Simplify the expression:-10(3x-6)3 61.5 dividido entre 0.750 Briefly explain the three clues that suggest that bacteria are an evolutionary success story 1. What does the method of animation in the zoetropehave in common with today's animation? Games:- Anyone who - Word association - Class count Chose one game and write a paragraph about 1. The Game or activity you have chosen and which goal of drama education it connects to2. How it connects to the goal ( it teaches students...... because.....) Plzzzz I need this fast just give ideas dont need to write the paragraph 5. Identify where the point of view shifts from third person to first person in the story. Why does the author use the first person to have Juvencio narrate this part of the story? Does the change significantly affect the tone of the narrative? Can you give me examples of grit in your life?Ill give brainlest When something is plumb, it isA. horizontally levelB. bobbedC. exactly verticalD. at a 30-degree angle please help me The measure of an exterior angle of a triangle is x. The measure of the adjacent interior angle is at least twice x. List three possible solutions for x. Michelle and Isabella are ice skating together. Michelle has a mass of 80 kg and Isabella has a mass of 50 kg. Both are at rest and and Isabella pushes of Michelle causing Isabella to move away at a speed of 4.0 m/s. Determine Michelle's speed. Fishing is NOT a popular attraction in Canada.TRUE or FALSE Assume the sales mix consists of three units of Product A and one unit of Product B. If the sales mix shifts to four units of Product A and one unit of Product B, then the weighted-average contribution margin will ________. a. stay the same b. cannot be determined from this information c. decrease per unit d. increase per unit Clear my choice Question 14 Not yet answered Points out of 2.00 Flag question Question text Assume the sales mix consists of three units of Product A and one unit of Product B. If the sales mix shifts to four units of Product A and one unit of Product B, then the breakeven point will ________. pls I NEED HELP PLS HELP MEEE ILL MARK BRANLIESTExplain a time when you see Pythagorean Theorem in real life. Explain the process you would use to analyze a situation and solve a problem involving the Pythagorean theorem. Be sure to write in complete sentences! Could someone please help me? You can ignore number 3:) Two new diploid cells are formed from each original. MITOSIS or MEIOSIS. 5. What is the name of the dragon that drove the dwarves from their homes, killed them, and stole their gold? Determine the greatest common factor of the given expressions.75m^4p^6(-m + n)65m^4 n^5(-m + n)^5