1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lbvjy [14]
2 years ago
8

What Does The Computer Monitor Contain?

Computers and Technology
1 answer:
Nana76 [90]2 years ago
7 0

Answer:

a visual display, some circuitry, a casing, and a power supply.

Explanation:

Screen, Layered Glass, Stands, Power Connector, Interface Board, Amplifier Circuit, and Reflectors and Light Sources.

You might be interested in
What are some other ways to program a robot to navigate a complicated environment other than straight paths and right angle (90
In-s [12.5K]

Answer:

The most popular method of robot programming is probably the teach pendant. ... To program the robot, the operator moves it from point-to-point, using the buttons on the pendant to move it around and save each position individually. When the whole program has been learned, the robot can play back the points at full speed.

8 0
3 years ago
Read 2 more answers
A___________is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its
Molodets [167]

Answer: rootkit

Explanation:

Hi, A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.

A rootkit provides continued privileged access to a computer while hiding its presence. Because of this hiding characteristic it is very difficult to detect.

Once a rootkit has been installed, it allows someone to have total remote control of a computer and do things such as files executions and system changes.

4 0
3 years ago
In cell j6, enter a formula to determine the cost of gas if the customer chose that option as indicated in column i. if the cust
Alex73 [517]

Answer:

a t t i c

Explanation:

7 0
3 years ago
Define and implement a method that takes a string array as a parameter and returns the length of the shortest and the longest st
Drupady [299]

Answer:

#HERE IS CODE IN PYTHON

#function to find length of shortest and longest string in the array

def fun(list2):

   #find length of shortest string

   mn=len(min(list2))

   #find length of longest string

   mx=len(max(list2))

   #return both the value

   return mn,mx

#array of strings

list2 = ['Ford', 'Volvo', 'BMW', 'MARUTI','TATA']

# call the function

mn,mx=fun(list2)

#print the result

print("shortest length is:",mn)

print("longest length is:",mx)

Explanation:

Create an array of strings.Call the function fun() with array as parameter. Here min() function will find the minimum string among all the strings of array and then len() function will find its length and assign to "mn". Similarly max() will find the largest string and then len() will find its length and assign to "mx". Function fun() will return "mn" & "mx".Then print the length of shortest and longest string.

Output:

shortest length is: 3

longest length is: 5

7 0
3 years ago
What scientific principle would a plumber need to know when designing and installing plumbing a new construction
Volgvan
Diong reasearch to know what your dion
7 0
3 years ago
Other questions:
  • What is the internet?
    5·2 answers
  • File-sharing programs such as Napster, Kazaa, and iMesh make it possible for individuals to exchange music files over the Intern
    7·1 answer
  • 4. Where do you find the command to create bibliography citations or a table of contents?
    14·2 answers
  • How has information technology made piracy possible
    14·1 answer
  • Password is an example of an authentication mechanisms that is based on " what an entity has".
    6·2 answers
  • The HTTP protocol operates at which layer?
    7·1 answer
  • JAVA
    7·1 answer
  • How do we add questions on sam Blockly?​
    6·1 answer
  • For a parking application that lets you pay for parking via your phone, which of these is an example of a functional requirement
    8·1 answer
  • Which role will grant a delegate read-only access to a particular workspace within a user’s Outlook mailbox?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!