1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elena-2011 [213]
1 year ago
7

Name various input and output devices used with computers.

Computers and Technology
1 answer:
astra-53 [7]1 year ago
6 0

Answer:

Input: Keyboard, Mouse, Microphone, Gaming Controller

Output: Monitor, TV, Headphones, Speakers

Explanation:

Input Devices are used to send signals to the computer.

Output Devices use signals from the computer to give you information

You might be interested in
In which generation of computers are we in?​
qwelly [4]
It should be the Sixth generation
4 0
3 years ago
What will be the results from running the following code?
kari74 [83]

Answer:syntax error

Explanation:

Correct on edg 2021

4 0
2 years ago
A _____ is sent to companies that are hiring to get an interview. résumé brochure business report newsletter plz hurry need it n
frozen [14]

Answer:

A application

Explanation:

3 0
2 years ago
Read 2 more answers
Which is an example of the operation of a game?
SVEN [57.7K]

Answer:

D.  

The player uses a joystick to control the character.

Explanation:

The MEANING of operation is: "The fact or condition of functioning or being active."

This explains that the answer is D because you are using the joystick to control the character. Hope the helps.

6 0
2 years ago
Read 2 more answers
A _____ is a computer network that connects computers within a school.
Savatey [412]
Usually a LAN (Local Area Network), but it's not a requirement. A WAN (Wide Area Network) would need to be used in a multi-campus setup.
3 0
2 years ago
Other questions:
  • Which activity cannot be done on a social networking site?
    12·1 answer
  • Write thanks to the IT teacher at the end of grade 5
    7·1 answer
  • A(n) ________ is a special value that cannot be mistaken as a member of a list of data items and signals that there are no more
    9·1 answer
  • Describe the functions of ALU, resisters, CU, BIU, Cache and FPU.
    7·1 answer
  • A network administrator recently implemented two caching proxy servers on the network. how can the administrator best aggregate
    5·1 answer
  • Public-key cryptography can be used for encryption (ElGamal for instance) and key exchange. Furthermore, it has some properties
    9·2 answers
  • Though most of the content on this social network is uploaded by amateurs, many companies offer streaming video content related
    10·1 answer
  • NEED HELP
    9·1 answer
  • 1. Encrypt this binary string into cipher text: 110000. Include in your answer the formula the
    10·1 answer
  • Which privacy protection uses four colors to indicate the expected sharing limitations that are to be applied by recipients of t
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!