list out the input and output device .​

Answers

Answer 1

Computer - Input Devices

Keyboard.

Mouse.

Joy Stick.

Light pen.

Track Ball.

Scanner.

Graphic Tablet.

Microphone.

Computer - Output Devices

Monitor.

Printer.

Headphones.

Computer Speakers.

Projector.

GPS.

Sound Card.

Video Card.


Related Questions

1.a computer can create an output based on the input of the user.

process store retrieve communicate personal computer desktop computer laptop computer netbook tablet smartphone server game consoles​

Answers

Answer:

But users are very much aware of the input and output associated with the computer. They submit input data to the computer to get processed information, the output. Sometimes the output is an instant reaction to the input. ... The output is the computer's instant response, which causes the forklift to operate as requested.

Ulrich has to present his findings on the music of modern Japan at school the next day. What is the BEST way for him to do this?

A.
A direct speech to the class

B.
A multimedia presentation with sound

C.
A written essay with image handouts

D.
An interactive workshop involving the class

Answers

Answer:

c

Explanation:

Do a quick search for “The Sun”. What types of results do you see?

Answers

Answer:

What happens when you look at the Sun?

When you stare directly at the sun—or other types of bright light such as a welding torch—ultraviolet light floods your retina, literally burning the exposed tissue. Short-term damage can include sunburn of the cornea—known as solar keratitis. ... This occurs when UV light literally burns a hole in the retinal tissues.Oct

You have answered 12 of 23 questions.
ing
1
Question # 13
A group of computers that share resources are called what?
2
O A server
3
O A personal computer
O A router
1
O A network
Read Question

Answers

Answer:

the answer is a network because the others are for different things

when someone uses your personal information to pose as you this is

Answers

Answer: identity theft

Explanation: identity theft is when somebody poses as you, not to be confused with identity fraud, which is when somebody takes your personal information (such as a credit card) to do things in your name.

what does the term attenuation mean in data communication?

Answers

Simple Answer: Loss of signal strength

Information: Attenuation is the loss of signal strength in networking cables or connections

Which formula calculates the total value of a single row of cells across a range of columns in excel

Answers

The formula which calculates the total value of a single row of cells across a range of columns in Microsoft Excel is: =SUM(C15:Y15).

Microsoft Excel can be defined as a software program (application) that is typically designed and developed by Microsoft Inc., to avail its end users the ability to analyze and visualize spreadsheet documents.

A spreadsheet can be defined as a file or document which comprises cells in a tabulated format (rows and columns), that are typically used for formatting, arranging, analyzing, storing, calculating and sorting data on computer systems through the use of Microsoft Excel.

In Microsoft Excel, the SUMIF function is a function which is used to calculate the total value of cells that meet a specific criteria such as:

Text.Dates.Numbers.

Hence, "=SUM(C15:Y15)" is a formula which can be used to calculate the total value of a single row of cells across a range of columns in Microsoft Excel.

Read more: https://brainly.com/question/24249483

How does net neutrality protect your information? Do they connect everyone into something?

Answers

Answer:

Net neutrality law focuses on regulating and/or preventing three main practices:

Blocking: ISPs cannot block or prevent access to any lawful content on the web.

Paid prioritization: Providers cannot prioritize companies or consumers who pay a premium for a “fast lane” and keep those who don’t pay in a “slow lane.”

Throttling: Providers cannot limit your bandwidth or slow your connection based on your internet activities.

Without net neutrality or other laws protecting equal content, ISPs could, in theory, block certain websites and favor others. For example, your internet provider could theoretically make Netflix slower in order to push you towards its cable TV service.

Or, Xfinity could allow their subscribers to stream Peacock content (which they own through NBCUniversal) for free, while charging subscribers for watching Netflix. With net neutrality, you would have free and equal access to both Peacock and Netflix.

Another example would be your ISP slowing your connection every time you try to game over Twitch, but speeding it back up again when you’re not gaming, a practice known as throttling.

Explanation:

Answer: Net neutrality rules prevent this by requiring ISPs to connect users to all lawful content on the internet equally, without giving preferential treatment to certain sites or services. In the absence of net neutrality, companies can buy priority access to ISP customers.

What is computer specification

Answers

Answer:

Computer hardware specifications are technical descriptions of the computer's components and capabilities. Processor speed, model and manufacturer. Processor speed is typically indicated in gigahertz (GHz). The higher the number, the faster the computer.

what threat do insiders with authorized access to information or information systems pose

Answers

Answer:

Depens on the permissions the user has been granted if the user leaks the infomation it will break the CIA triad rule. To be more specific it will break the confidentiality rule in the triad. If the user has the permission to delete data it will break the availability rule because the data is not avaliable as the user deleted the data. If the user has permissions to edit the data, it will break the integrity rule in the triad because the data is no longer reliable or trustworthy.


Why is it important to create a web maintenance schedule? Check all of the boxes that apply.

Answers

Attach a picture so we can see the question

A, B, D

I just did it mate :)

mention two cables that connect the monitor to the system unit​

Answers

Answer: The power cable and the connecter cable.

Explanation:

please help me i give brainly

Answers

Answer:

I hope this is right, but it may not be so you might want to recheck your lesson, but i hope this helps you. Have a great day!

Explanation:

Develop an algorithm to print the names of the candidates who should receive a refund. A refund is due if the candidate's votes received equals or exceeds 20 per cent of the votes cast in the constituency. The algorithm should also determine and print the number of candidates who received a refund. Test the algorithm with data from ten candidates. The algorithm must accept as input the names of the candidates, votes received and the votes cast in the constituency. The algorithm should print the name of the candidate and the words "Refund Due" or "No Refund" and the number of candidates who received a refund.​

Answers

Answer: start

input candidate name, votes received and vote cast

if count =number of candidate who re

Explanation:

Which graphic file format would you choose if you needed to make an animated graphic for a website?

Answers

Answer:

GIF – Graphics Interchange Format

Explanation:

what is the most popular game design engine today

Answers

Unreal Engine and Unity

Answer:

i think its an gamemaker

Explanation:

Lists are indexed by an ________. a. float b. integer c. string d. All of the above​

Answers

All of above?

May be but not sure.

Lonnie needs to use a special kind of block in his game that will tell him whether an object has slammed into his car true or not false what kind of block should Lonnie use

Answers

Block in programming in other to evaluate a condition such that it returns a boolean upon which a statement or action is then taken is the conditional block . Hence, Lonnie should use the conditional block.

The conditional block evaluates a condition and gives a True or False output which can the be used perform any statement or action of choice.

Lonnie could use the block as follows :

if (object_slammed_into_car) :

Statement

else :

Statement

The statement could be replaced with True, False values or any output of choice.

Learn more : https://brainly.com/question/25264145

when is not appropriate to be funny in a headline

Answers

Answer: I it is something serious like the death of a person then you should not be funny

What is the value of x after running this code?

x = 0
for y in [1,2,3,4,5,6,7,8,9,10]:
x = x + y

Answers

counter = 1

sum = 0

while counter <= 6:

sum = sum + counter

counter = counter + 2

print(sum)

A. 12

B. 9

C. 7

D. 8

✔️ Correct! This loop executes 3 times. After the first loop sum = 1 and counter = 3, after the second loop sum = 4 and counter = 5, and after the third loop sum = 9 and counter = 7.

When the code runs it sums up the numbers, which results in 55. It says AFTER the code is finished so the answer will be 55. You can verify this by printing X again after the for loop

what is the process where a computer starts up and automatically loads the operating system​

Answers

Answer:

What is Booting

Explanation:

The process of bringing up the operating system is called booting (originally this was bootstrapping and alluded to the process of pulling yourself up "by your bootstraps"). Your computer knows how to boot because instructions for booting are built into one of its chips, the BIOS (or Basic Input/Output System) chip.

Did this help?

Brainly, thank you, rating are all very much appreciated!

Smile ; ) - Miss Hawaii

Explanation:

The process of loading the operating system into memory is called bootstrapping, or booting the system.

Solve using the standard algorithm 758 x 92

Answers

The answer to the following problem using Standard Algorithm is 69,739. See the explanation below and the attached image.

How do you perform a standard Algorithm?

A standard Algorithm means that you do the multiplication by hand. Traditional methods or standard algorithms involve multiplying numbers and ordering the result by bit value. Here are the steps to do long multiplication manually:

Arrange the numbers on top of each other and put the values ​​in the columns. The number with the most digits is usually placed at the top as the multiplier.Start from one digit in the bottom digit, multiply by the last digit in the top digitWrite your answer under the equal signIf the answer is greater than nine, enter the number one as the answer and indicate the level numberContinue from right to left. Multiply one digit in the bottom digit by the next digit to the left of the top digit. If you carry a number with you, add it to the result and write the answer under the equal sign. If you must wear it again, please do. As you multiply ones by each digit of the top digit, move to the digit at the level of the bottom digit.Multiply as above, but this time write the answer on a new line and move one digit to the left. After multiplying, draw another answer line below the answer numbers in the last row.Add your column of numbers from right to left using long addition and carry as you would normally do long addition.

Learn more about Standard Algorithm:

https://brainly.com/question/28626488

#SPJ1

WILL GIVE Brainliest!!!!
Select the six criteria for a baseline.
goal

future

defines

assessment

desired

beginning

score

progress

broad

start

Answers

Answer:

start

Explanation:

Answer:

desired

goal

progress

start

defines

future

Explanation:

PLEASE HELP THIS IS CONFUSING ME

Answers

Answer:

The answer is:

Yes, because Antonio clearly copied someone else's words.

Explanation:

It is still forbidden to plagiarize Wikipedia despite it being a Open-Source Data base of information. This means, unless you directly cite in a bibliography or with in-text citations, the article, the author, and everything else needed in the proper citations for the format, it is plagiarism.

Answer:

Yes, Antonio is plagirizing since he did not site the author of that specific Wikipedia Page.

Explanation:

Plagirisim can be avoided by citing the source of the paragraph, but you need to be specific by stating the author of the pargraph, and what the title of the webpage or book was. Otherwise, you can be suspect to prosecution and suspention at your school.

What does elif mean? A. else B. if C. eliminate if D. else if

Answers

Answer:d

Explanation:

Answer:

D. else if

Explanation:

Elif is short for else if.....

E SEQUENCE OF ACTIONS THAT ALLOWS YOU TO DOUBLE UNDERLINE A PIECE OF TEXT IN YOUR DOCUMENT IS: *

EDIT, INSERT, UNDERLINE, DOUBLE
FORMAT PARAGRAPH, UNDERLINE , DOUBLE
FORMAT, FONT, UNDERLINE STYLE, DOUBLE
FORMAT, FONT, SPACING, UNDERLINE STYLE, DOUBLE

Answers

Hun hbu jh jjjjj iujjjij I

What are some limitations when it comes to testing and ensuring program quality? List at
least two limitations; you may refer to specific kinds of testing in your answer.

Answers

Answer:

the two limitation i can think about is the efficiency like if there are bugs or glitches or if it can get broken into and the second one is if it is running the correct program or not a lot of people deal with this problem.

Explanation: personally these are the two i can come up with at the moment

The two limitations that come arrive in the process of testing and ensuring program quality are as follows:

The errors and kinds of glitches in modern technology seem like distractions in usual life. The overdependency on these resources may harmful to a larger extent.

What is Program quality?

Program quality may be defined as the fundamental properties of the program's source code and executable code, including reliability, robustness, usability, portability, maintainability, efficiency, and readability.

According to the context of this question, there are various limitations in each and every field of development whether it is science or technology. Similarly, there are a lot of drawbacks in testing and ensuring program quality. You have to manage each and everything in a systematic way in order to ensure the testing of program quality.

To learn more about Program quality, refer to the link:

https://brainly.com/question/13381607

#SPJ2

most computers have temporary holding areas called __________.

Answers

Answer:

Random Access Memory (RAM)

RAM (Random access memory)

In your opinion., which Zelda character is the hottest? Be honest.

Answers

Answer:

link<3

Explanation:

how do ""night modes"" on computer screens help people fall asleep?

Answers

Answer:

it doesn't really help people fall asleep but

Explanation:

When it gets dark, your pineal gland secretes the hormone melatonin, which tells your body to get tired and go to sleep.

Answer:

Answer it doesn't really help people fall asleep but some people it can

Explanation:

Most people dont fall asleep while on computers but the people who do it helps because the screen is not all bright and doesn't keep your eyes wide open

Other Questions
Compare and contrast positive and negative spaces of an artwork. What is one thing that makes them different from each other? Mr. Candy needs to purchase large bags of Snickers to sell in the school store. A bag of Snickers contains 72 Snicker bars. A bag of Snickers cost $23. How much should Mr. Candy sell the Snicker bars to make a profit of $49? Describe the overall main parts of the immune system Find the equation in slope-intercept form that describes line.A line through (-1, 1) and (2,3) Alguien se ducha.1 of 3 se ducha.2 of 3 se ducha 3 of 3 .Question 2 with 3 blanksEllas van tambin.Ellas 1 of 3 van.Ellas 2 of 3 van 3 of 3 .Question 3 with 3 blanksAlguien se pone nervioso.1 of 3 se pone nervioso.2 of 3 se pone nervioso 3 of 3 .Question 4 with 3 blanksT siempre te lavas las manos.T 1 of 3 te lavas las manos.T 2 of 3 te lavas las manos 3 of 3 .Question 5 with 2 blanksVoy a traer algo.1 of 2 voy a traer 2 of 2 .Question 6 with 3 blanksJuan se afeita tambin.Juan 1 of 3 se afeita.Juan 2 of 3 se afeita 3 of 3 .Question 7 with 3 blanksMis amigos viven en una residencia o en casa.Mis amigos 1 of 3 viven 2 of 3 en una residencia 3 of 3 en casa.Question 8 with 2 blanksLa profesora hace algo en su escritorio.La profesora 1 of 2 hace 2 of 2 en su escritorio.Question 9 with 2 blanksT y yo vamos al mercado.1 of 2 t 2 of 2 yo vamos al mercado.Question 10 with 2 blanksTienen un espejo en su casa.1 of 2 tienen 2 of 2 espejo en su casa.Question 11 with 1 blankAlgunos nios se ponen el abrigo.1 of 1 nio se pone el abrigo. 2. Who determines the minimum wage in a particular geographical area? How is the mini-mum wage determined? The Iroquois Confederacy was a collective of six AmericanIndian tribes in northeast North America. Each tribe had itsown language and territory and a different function withinthe confederacy. The confederacy was led by an assemblyof 50 chiefs, each representing a different clan from withinthe tribes. Members of this assembly were chosen by themothers of each clan. Revisions to laws or customs had tobe approved by a majority of the mothers as well. The government of Switzerland is divided into 26 districts,called cantons. The Swiss constitution was adopted in1848, making it one of the oldest the world. Theconstitution outlines basic rights for individuals anddivides power between the different cantons and thenational government. Swiss citizens are able to participatein their government by voting directly on laws. They evenhave the power to challenge laws passed by thegovernment.What do the two civilizations described in the passage have in common? A. They are both constitutional monarchies B. They are absolute monarchies C. They are both democraciesD. They are both theocraciesPLS!! HELP!!! B. Spread the News. It is October 1765, the morning after the attack on the lieutenant governors house. You cant wait to tell your Aunt Martha what happened. But not only that, you cant wait to tell her exactly what you think about the attack. Was it right? Wrong? Was it a victory? A horrible thing? Will the attack help or hurt the cause? Tell your Aunt Martha what you think and why. List THREE ways countries, private businesses, and organizations are providinggreater access to electricity When converted to a household measurement, 9 kilograms is approximately equal to a Which of the following is NOT a type of memo?Field report memoResponse memoFact check memoDirective memo Since the Texas State School story broke, youth on youth assaults have decreased substantially.A. TrueB. False These are questions about The main causes of world war 1 donna is a very smart accountant. She is friendly and outgoing but sometimes she gets distracted and does not turn in her work on time. Her manager is looking for someone to work with a very important client but donna is not considered for the opportunity what quality is donna lacking.leadershipdependability positivity motivation I will give 20 points and brainliest if correct plz give me right answer Which aspects did Britain argue for? Which aspects did the colonists argueagainst? Write an equation that represents the line.Use exact numbers. an 18-month-old patient has been started on chemotherapy. which means are used to adjust the drug dosages? If 5x+ 3 = 10x 17, what is the value of x?A. 1B. 2C. 3D. 4E. 5 cate suntete sunt in cuvinele:cear, ciuline, geant, gimnaziu, chemare, chirie, Kenia, kilometru, Quebec, quito, ghemotoc, ghiveci.magie, saci, chinezi, unchi, ureche, cheam, geam, gem, ghem, gheat, ghind,ghiuleava rog frumoss Please help me this question