All the processing-of work-done on a computer is performed by the what?

Answers

Answer 1
Answer: it's computed by the processor

Related Questions

Which one of the following security controls is built into Microsoft Windows? Option 1: Antivirus software Option 2: Intrusion Detection System (IDS) Option 3: Host firewall Option 4: Network encryption
The OnStar system allows Select one: a. a vehicle owner to initiate a conversation with an OnStar representative. b. the vehicle to automatically send a message to an OnStar representative after an accident. c. an OnStar representative to disable the gas pedal of the vehicle without the driver's permission. d. a and b e. a, b, and c
Which of the following Amazon services is used to deploy machine learning models at scale? a) Amazon Web Services (AWS) b) Amazon Echo c) Amazon Fresh d) Amazon Prime
What are the ethical implications of online social media after someone has died?
Given the int variables x, y, and z, write a fragment of code that assigns the smallest of x, y, and z to another int variable min. Assume that all the variables have already been declared and that x, y, and z have been assigned values.

Match the CIA triad to the methods and techniques used to ensure them: preparing for fast disaster recovery with backups and business continuity plans Biometric Verification 1. Confidentiality promptly applying system upgrades and patches 2. Integrity Two-Factor Identification 3. Availability One way encryption checksums (hashes) File permissions Match the terms with associated concepts. used to determine identities and permissions 1. Authentication and Authorization detection of intruders by monitoring network traffic/intruders 2. Prevention and Resistance 3. Detection and Response stop intruders from accessing and reading data Match the terms with associated concepts. Encryption that uses a pair of keys, one called a public key and the other a private key. Using the same key to encrypt and decrypt a message. 1. Asymetric key encrption 2. Symetric key encryption Allows people to exchange secret messages without ever having met to exchange a key 3. One-way encryption < A hash function that generates a digital fingerprint of a message is an example of this

Answers

The CIA triad, which stands for Confidentiality, Integrity, and Availability, is a framework for ensuring information security. Each aspect of the triad is associated with different methods and techniques to ensure its protection.

The correct matching for the first part of the question is:


1. Confidentiality - Biometric Verification, Two-Factor Identification, File permissions
2. Integrity - One way encryption checksums (hashes), promptly applying system upgrades and patches
3. Availability - preparing for fast disaster recovery with backups and business continuity plans

The correct matching for the second part of the question is:


1. Authentication and Authorization - used to determine identities and permissions
2. Prevention and Resistance - stop intruders from accessing and reading data
3. Detection and Response - detection of intruders by monitoring network traffic/intruders

The correct matching for the third part of the question is:


1. Asymetric key encryption - Encryption that uses a pair of keys, one called a public key and the other a private key.
2. Symetric key encryption - Using the same key to encrypt and decrypt a message.
3. One-way encryption - A hash function that generates a digital fingerprint of a message is an example of this; Allows people to exchange secret messages without ever having met to exchange a key

Learn more about The CIA triad:

brainly.com/question/30479580

#SPJ11

What two protocols form the foundation of and govern the way we communicate on the internet?

Answers

AppleTalk and RS-422.

Which of the following data structures can erase from its beginning or its end in O(1) time?

Answers

The stack data structure can erase from its beginning or its end in O(1) time.

The O(1) complexity is an illustration of getting operations done in a constant time.

Stack data structure uses the push and pop operations for inserting and deleting items in a linear or constant time.

This implies that, inserting an item into a stack happens in O(1) time, and also; removing an item from the stack, irrespective of the item location (beginning, end, or in between) happens in O(1) time.

Read more about data structure at:

brainly.com/question/21287881

Where all "the following" i can help you but you said which of the folllowing and ther no picture or anything?

The two basic kinds of transistor circuits are amplifying and switching. A. True B. False

Answers

Answer: false

Explanation:

The ____ is composed of tabs, each containing groups of related commands.a. status bar
b. Office menu
c. QAT
d. Ribbon

Answers

Ribbon im pretty sure is your answer

Whereas lines of competition are clearly defined in the more established industries, in the Internet industry they are blurred and indistinct, as companies that compete.

Answers

Answer:

Whereas lines of competition are clearly defined in the more established industries, in the Internet industry they are blurred and indistinct, as companies that compete one day may be partners the next. So "Lines" cannot be compared to/with internet companies.

Explanation:

The Internet Industry  is shaped by its unique framework outlining and its own rules between the companies within it, which offer a vast number of products and services and not always competing with each other compared with the traditional established industries competition lines that were developed from two parties or more aiming the same unshareable goal. These industries are stablishing the lines of competitions predicament which by all means can not be measured and applied using the same criteria for both of them.

The online industry is claiming for flexible, pliant lines of competition to be inforced to its specific logic and mechanisms.

The companies are now in a brand new competing ground with the digital area, so traditional established bart lines of competition although clear and defined are becoming obsolete facing the current surprising thus blurred and indistict internet industry lines.