1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex73 [517]
2 years ago
6

What are the two most common input and output devices?

Computers and Technology
2 answers:
serious [3.7K]2 years ago
3 0

Explanation:

<u> </u>

<u>Input & Output DevicesMouse and Keyboard. The two most common forms of input related to computers are the mouse and keyboard. ...Monitor. As humans are visually-focused, the most common output device is the monitor. ...Printers and Scanners. ...Microphone and Speakers.</u>

\huge\mathbb\colorbox{black}{\color{lime}{AnSwEr by ਪ੍ਰੀਤ ❣}}

NARA [144]2 years ago
3 0

Answer:

<em>Keyboard and mouse</em> are the most common <em>input devices</em>.

<em>Monitor and the printer</em> are the common <em>output devices.</em>

You might be interested in
What are the types of action involving data base?
Alexeev081 [22]

Answer: The DBMS is a software system that explains the four types of actions, which are defining, constructing, manipulating, and sharing databases among various users and applications.

3 0
3 years ago
10 sentences about computer parts.
Ahat [919]
One computer part is the CPU, it’s a piece of hardware the last allows your computer to access and interact all the applications and programs. The first ever CPU chip was invented around 4 decades ago. The keyboard is another computer part and it allows the user to type letters and numbers. There are about 104 keys on a keyboard and there are different parts in it. Some of the parts include, control keys, function keys, navigation keys, numeric keypad, and so on. A mouse is another device used with the keyboard to position the cursor. It’s a hand held device that detects two-dimensional motion relative to a surface. This motion is typically translated Into the motion of a pointer on a display, which allows a smooth control of the graphical user. Memory is a device to store all of your information and saved data. The motherboard is the backbone that tied together the computers components at one spot.
6 0
2 years ago
How to delete audio from powerpoint​
Marta_Voda [28]

Answer:

To delete an audio clip, select the audio icon on the slide and press Delete.

Hope it helps!!!!

4 0
3 years ago
What are the limits of hashing and verifying that files haven’t changed?
earnstyle [38]

The hashing function can take any number of key-value pairs and there is no specific limit to it.

<h3>What is hashing?</h3>

Hashing is a file-based algorithm for producing a fixed-length bit string value. A file is essentially a collection of data blocks. The length of the data is reduced by hashing to a fixed number or key that represents the original string.

When hashing is employed, the hash function may plot all of the keys and values to what the real size of the table is, demonstrating that the hashing function can take any number of key-value pairs with no restriction.

However, if the passwords are hashed in encryption, recovering the passwords is extremely difficult.

Thus, the hashing function can take any number of key-value pairs and there is no specific limit to it.

Learn more about the hashing here:

brainly.com/question/13106914

#SPJ1

5 0
2 years ago
To keep your audience interested in your speech, you should provide them with as many details as possible about the topic.
soldier1979 [14.2K]
The answer is False.  <span>To keep your audience interested in your speech, you should do the ff techniques : 
</span><span>1. Talk about something your audience is interested in
</span><span>2. Tell them why they should listen
</span><span>3. Don’t make it too easy or too hard
</span><span>4. “Change grabs attention”
</span><span>5. Tell stories
</span><span>6. Have frequent breaks
</span><span>7. Make it short</span>
4 0
3 years ago
Other questions:
  • What is a step by step procedure written to carry out a task?
    11·1 answer
  • When does state law require drivers to use their headlights (6)
    11·2 answers
  • Many 12-15 yrs hv access to the internet which cannot be supervised by an adult.i need 5 problems tht this might cause
    5·1 answer
  • How many bits are used to direct traffic to specific services running on a networked computer?
    6·1 answer
  • Create and test a user-defined function named ufnFullName that combines the values of the two parameters named FirstName and Las
    15·1 answer
  • Need help please. this effect my technology
    15·1 answer
  • Your network has four Hyper-V hosts, which are running three domain controllers and about 10 member servers. Three of the member
    10·1 answer
  • Examples of email use that could be considered unethical include _____.
    14·2 answers
  • (C) Describe about the different types of computer<br> peripherals and memory devices.
    9·1 answer
  • What type of malware is best known for carrying other malware as a payload?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!