1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Afina-wow [57]
2 years ago
15

24 3 Ans a. Define the term computer hardware. b. C. What are input devices? List any two input devices. What is processing devi

ce? Write the name of processing devices d. What are output devices? Name any two common output devices Differentiate between soft copy output and hard copy output? f. What are storage devices? Write two such devices. e. g. What is primary memory? What are its types. h. What are the differences between RAM and ROM? i. What is CPU? List its major parts. j. Write short notes on the following: i. Keyboard Rising School Level Computer Science - 6 ii. Control unit iii. Printer​
Computers and Technology
1 answer:
marysya [2.9K]2 years ago
8 0

Explanation:

hardware are the physical parts of the computer which can be touched seen and felt is called hardware.

the device which are use to inter data and instructions from the user is clawed input device. foreg; keyboard , mouse.

the processing device of computer is cpu

the printed information which can be touched and seen is Called hardcopy .

soft copy are which can be seen but not touched is called soft copy .

the device that are use to store data and instructions is called storage devices.

You might be interested in
What is the definition of phishing with an example
Diano4ka-milaya [45]
Phishing is an ability of fraudulently obtaining personal info.
synonyms: Fraud and scam
8 0
3 years ago
Fourlotts Corp. provide integrated services that include storing manufactured goods, packaging, and delivering it to the dealers
PilotLPTM [1.2K]

Answer:

The answer is "Logistics provider of third parties".

Explanation:

In the given statement some information is missing, that is options, which can be described as follows:

a.Center for Allocation

b. Logistics provider of third parties

c. supplier

d. Manufacturer with contracts

The company provides contracted logistics facilities provided by any part of the sourcing and distribution operations. In the 3PL will have a specific definition for any service agreement requiring processing or shipment of goods, and certain choices were wrong, which can be explained as follows:

  • In option a, It includes products and services.
  • In option b, It is a person that provides the products.
  • In option d, It enables the customer to get off an incredibly important project, that saves a lot of cash.

7 0
3 years ago
What do y’all think are the pros and cons to using technology?
BigorU [14]

Answer:

Explanation:

pros. convenient, easy to use, and educational  cons. addictive, mentally draining, and creates a social divide.

7 0
3 years ago
In December of 2009, hackers broke into computer systems and stole secret defense plans of the United States and South Korea. Th
svetlana [45]

Answer:

Cyberterrorism

Explanation:

Cyberterrorism is unlawful use and exploitation of computers and networks (internet) by an individual or a group.

This is done to carry out illegal activities that can cause serious harm to people, government or causing large scale damage to computer systems.

The motivation behind cyberterrorism is usually to achieve some political or ideological or personal objectives, to cause disruption and coercion in a community, to damage the security systems or other government programs thus causing "terror".

Cyberterrorism is done using internet to cause damage to other computer systems  by means of malicious software in order to create disruption, terror or stealing the sensitive information.

For example the cyber terrorists can steal confidential information of military department by attacking the security systems for some political gain just as the hackers stole secret defense plans of US and South Korea which was an act of cyberterrorism.

7 0
4 years ago
What is a resistor?<br> O A switch<br> O A light bulb<br> O A battery
MrMuchimi

Answer:

A Battery would be the correct awncer

8 0
3 years ago
Other questions:
  • When might it be necessary or advisable to write a shell script instead of a shell function? give as many reasons as you can thi
    15·1 answer
  • Is the protocol that specifies how web browsers and servers communicate.?
    11·1 answer
  • Your computer is slowing down because you’ve started a process that is taking most of the memory and CPU resources. Which of the
    7·1 answer
  • Your program will demonstrate use of arrays, searching an array, using methods, passing parameters by reference, returning value
    13·1 answer
  • If I had a picture of my friend on my camera that I wished to insert into a publication, which icon would I select from the Inse
    5·1 answer
  • Henry is designing a document for his architecture project. In which order should Henry preform the different tasks that are req
    7·1 answer
  • Websites whose URL’s contain tildes (~) are usually published by the government. True or false?
    8·2 answers
  • Define E-Mail Write any 4 special features of E-Mail ​
    13·1 answer
  • Select the correct answer
    15·1 answer
  • Write a python program to check whether the number is divisible by 7. If its divisible, print its divisible otherwise find previ
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!