Riser cards on some proprietary systems plug into a unique socket or slot on the motherboard. These are also called________

Answers

Answer 1
Answer:

Answer: Daughter board

Explanation:

A daughter board is refers to the circuit board and it is basically connected to the motherboard directly without any interruption.

It is also known as a daughter card which plugs and then extended the circuitry by connecting with the another circuit board. A mezzanine card and the riser card are the examples of the daughter board that used in the system.

According to the question, the riser card basically plus into the unique socket or the slot in the board and this is known as the daughter board.

Therefore, Daughter board is the correct answer.          


Related Questions

Who is responsible for providing the equipment employees need to stay safe on the job (like a hardhat or safetygoggles)?• the Occupational Safety and Health Administration (OSHA)O the employerthe labor unionO the employeeMacBook Pro
You listened to a song on your computer. Did you use hardware or software?
Computer trespass can be harmless. a. True b. False
To import data to a table, tap or click the ____ tab on the ribbon.
Choose the answer that describes the following: tres líneas diagonales y una línea horizontal. A. ///— B. ///| C. //| D. //—

During which phase of a hacker's five-step approach does the hacker scan a network to identify IP hosts, open ports, and services enabled on servers and workstations?

Answers

Answer: Reconnaissance

Explanation:Reconnaissance is referred as the initial/primary phase in which the attacker/ hacker puts the every effort to gain the knowledge about the target that is collecting facts about the DNS data, network records, IP address, range of IP etc.

It is the initial step done by the attackers to do the preparation of the hacking.It is done by the two phases that is active phase and the passive phase.

Which of the following is a huge web of interconnected computer networks located all across the globe?a. Internet
b. Protocol
c. TLD
d. URL

Answers

With the presented options together with the problem, the most probable and the most likely answer to this question would be A. Internet.

The Internet is a huge web of interconnected computer networks located all across the globe. The internet is also widely known to be as the World Wide Web or www. This is what is seen in websites as the first part of their addresses, aside from the https. The internet is also know to everyone, and is taught in schools and universities, as the information super highway.

Will Mark BrainliestWhy did Constantine establish a new capital of the Roman Empire in Byzantium?



Byzantium was located on trade routes and could be better protected.


Byzantium was close to Rome, so travel between the two cities was easy.


Byzantium was already a huge city that needed little construction to make it the capital.


Byzantium was located in the middle of Europe and close to the people of the Western Empire.

Answers

Answer:

Byzantium was located on trade routes and could be better protected.

Explanation:

Byzantium became the capital of the Roman Empire in 330, with the established objective of fulfilling a fundamental role in the control of the commercial routes used by Rome to the East: this city was located in the passage of these commercial routes, thus which was fundamental its protection in order to control trade in the area. In this way, it was agreed to name this city as the capital, which gave importance to the eastern region within the Empire, and allowed these trade routes to be better managed and protected by the Roman government.

A                                                                  A

l Marking so other guy can get brainliest l

l                                                                    l

Negetive and positive impacts of social media on the right of privacy and safety

Answers

Ahh, social media, a constantly debatable way of communicating and sharing information.

Let's cover the positive aspects first:
- Safe way to communicate with people over the internet rather than in person
- Safety is looked after by community moderation and abuse teams
- New privacy options are able to secure information more thoroughly

Now, the more negative aspects:
- Privacy is never 100% guaranteed as systems can (and have been) compromised. 
- Users are oblivious as to how their information is stored and then used to make money through advertising companies.
- Your information, identity and life is available for anyone to see
- Your mistakes are marked on the internet forever, posts are never truly removed
- Cyber bullying is more prominent

Social media can be used in a positive way, it's up to you as to how you protect your information and interact online.

Determine a freshman's likely first-year grade point average from the student's Scholastic Aptitude Test (SAT) score, high school grade point average, and number of extra-curricular activities. This is an example of:________a. estimation of a continuous outcome.
b. unsupervised learning.
c. classification of a categorical outcome.
d. prediction of a categorical outcome.

Answers

Answer:

D) Prediction of a categorical outcome

Explanation:

Prediction problems involves determining an unknown value from known variables otherwise called predictor variables. In this case the problem is to tell the likely grade outcome of a freshman having known his scores in SAT and high school grade points

Torque is defined as _____.a. mass times velocity
b. force times lever arm
c. momentum times radius
d. force times time E. mass times acceleration

Answers

To find torque you B) multiply force and the lever arm.