1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
puteri [66]
4 years ago
11

Help! Will give Brainly Explain what input, output, storage, and processing are in relation to computer functions.

Computers and Technology
1 answer:
stepladder [879]4 years ago
3 0

Answer:

<em><u>please</u></em><em><u> </u></em><em><u>mark</u></em><em><u> </u></em><em><u>as</u></em><em><u> </u></em><em><u>brainliest</u></em><em><u> </u></em>

Explanation:

To function, a computer system requires four main aspects of data handling: input, processing, output, and storage. The hardware responsible for these four areas operates as follows: Input devices accept data in a form that the computer can use; they then send the data to the processing unit.

You might be interested in
A security administrator is reviewing the following information from a file that was found on a compromised host: Which of the f
Roman55 [17]

Answer:

C. Trojan

Explanation:

In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.

This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.

In this scenario, a security administrator is reviewing the following information from a file that was found on a compromised host: "cat suspiciousfile.txt."

Some of the ways to prevent vulnerability in a network are;

1. Ensure you use a very strong password with complexity through the use of alphanumerics.

2. You should use a two-way authentication service.

3. You should use encrypting software applications or services.

8 0
3 years ago
A final class can't be extended.TrueFalse
PIT_PIT [208]

Answer:

True

Explanation:

A final class is something like sealed one and no one can inherit that further.

it is useful to lock our code or functionality from others

4 0
3 years ago
Select the correct answer.
Veronika [31]
I think it’s c. llS....
6 0
3 years ago
Read 2 more answers
Chris has received an email that was entirely written using capitalization. He needs to paste this text into another document bu
dem82 [27]

Select the text you want to alter.

Press Shift+F3. Word changes the case of the selected text.

Continue pressing Shift+F3 until the case is the way you want it.

hope this helps

8 0
3 years ago
Read 2 more answers
What is a segment
monitta
A length of uninterrupted cable connecting two devices
3 0
3 years ago
Other questions:
  • Elise has just edited two photos of her cat and three different photos of her dog. She needs to save all five of these photos in
    5·2 answers
  • What are the two basic steps in communication
    9·1 answer
  • 3. If the typical balance on Lucy's credit card is $750 and the interest rate (APR) on her credit card is 16%, how much in inter
    11·2 answers
  • What network setting do i need for a workgroup?
    5·1 answer
  • What tasks do most operating systems perform?
    15·1 answer
  • Complete the statement below with the correct term.
    5·1 answer
  • In this lab, you will build a system for package delivery services that provides different shipping options with specific price.
    6·1 answer
  • How do i do a mutioutput on a mac
    9·1 answer
  • Any action that causes harm to your computer is called a
    15·1 answer
  • Select the correct answer.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!