1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nadya68 [22]
3 years ago
11

Which of these is an output device? keyboard mouse trackpad printer

Computers and Technology
2 answers:
Firdavs [7]3 years ago
6 0
I think a printer could be wrong
andre [41]3 years ago
3 0
Printer 100% sure :)))))))))
You might be interested in
What is a man-in-the-middle attack​
VMariaS [17]

Answer: An attack where the attackers will interrupt a data transfer happening between parties and in which they will pretend to be the legitimate parties.

Explanation: For example think about two people writing letters to each other back and forth. However you, the attacker can intercept the letters and effectively change the message/contents of the letter going to the other person. This is probably not the best explanation, but simply put a man-in-the-middle attack is when an attacker interupts a transfer and pretends to be the legitimate source.

4 0
2 years ago
Read 2 more answers
Which RFC reserves three ranges of IP addresses for private use - a single Class A (10.0.0.0-10.255.255.255), 16 Class Bs (172.1
erica [24]

Answer:

The answer is "1918".

Explanation:

The RFC stands for "remote function call", it is also known as an abbreviated form. It is an application, that responses in a technical online design Task Force, it is also known as a document, which was prepared for review by shareholders to collects some information.  

The RFC reverses is also known as an idea, that uses IP version 4 to reverse the IP address, this process is done by TCP/IP protocol, which is defined under RFC 1918.  

4 0
3 years ago
You wrote a program to allow the user to guess a number. Complete the code to generate a random integer from one to 10.
just olya [345]

Answer:

randint

Explanation:

Just did my quiz and got a 100%

7 0
3 years ago
Read 2 more answers
If an M:N relationship is mandatory on both sides, and if both relations resulting from the entities involved in the relationshi
vivado [14]

Answer:

0

Explanation:

In the problem above, the relationship that exists between M and N is discovered to be on each side of the system. Furthermore, it was stated that the outcome of the relationship also has approximately 3 records. This shows that there is no record for the bridge that is formed as a result of the relationship.

4 0
4 years ago
What type of network is the Internet? The Internet is an example of a_____network.
7nadin3 [17]

The Internet is an example of a WAN: Wide Area Network

5 0
3 years ago
Other questions:
  • Ben buys an Olympus E-PL2 from Sony which starts malfunctioning. When he opts for an exchange, the customer representative says
    11·1 answer
  • Load the titanic sample dataset from the Seaborn library into Python using a Pandas dataframe, and visualize the dataset. Create
    10·1 answer
  • 2. What is the layout of the modern keyboard known as?
    13·1 answer
  • Amy just added a 462 meter run of fiber optic cable to the network what should she do next?
    10·1 answer
  • 1000base-t is a standard for achieving throughputs ____ times faster than fast ethernet over copper cable.
    8·1 answer
  • Haley is helping to choose members for a customer satisfaction team. Which
    6·1 answer
  • What layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at t
    12·1 answer
  • Do pc players ever go outside?
    11·2 answers
  • Where else can the computer send the results of processing other than to output​
    13·1 answer
  • What type casting mechanism should be used if you want to safely change (cast) a pointer type for pointing to a different object
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!