1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
riadik2000 [5.3K]
3 years ago
7

A(n) is a place on a computer where you attach a device to exchange data with the computer

Computers and Technology
1 answer:
natta225 [31]3 years ago
3 0
I think a peripheral device can attach to a computer so that data can be exchanged between it and the operating system.
You might be interested in
If a program repeatedly shows separate feature branches rather than a true System Demo, which practice should be reviewed to add
Alenkinab [10]

Answer:

Continuous Integration tool is used to address the issue of separate features branch of program.

Explanation:

Continuous integration process comprise of three main objectives such as improvement, delivery and development of the software. In contentious integration tool all the people  three objective specialist are work together to make program better.

Continuous integration is a platform that is used to detect the problems in a code that need to be corrected. The code is store in the repository of the tool that needs correction. The reviewers review the code in different portions of the code and identify and resolve the problem. There are multiple contributors to correct the code.

8 0
3 years ago
In best practice, should you use all lowercase, all uppercase or a mixture of cases in HTML tag names?
mixas84 [53]
B considering it’s proper english, we went through this about a week ago
7 0
2 years ago
Anybody know this? Read the following scenario. Using complete sentences, explain which part of the CIA triad has been broken. M
Sergio039 [100]

Answer:

Availability

Explanation:

3 0
3 years ago
A group of eight bits is called a _______. a. numeric data b. byte c. megabit d. binary
RideAnS [48]
The answer is B: byte
8 0
3 years ago
Effectiveness of thicker,biodegradable plastic shopping bags
juin [17]

The Effectiveness of thicker, biodegradable plastic shopping bags is that they can last for a long time and still be able to carry shopping items  even if they are exposed to natural environment.

<h3>What is the use of biodegradable plastic bags?</h3>

Plastic bags are known to be part of modern technology. They are usually very  thin and strong. They are able to carry a heavy load as a result of shopping.

Conclusively, Note that this type of plastic bags which are said to be biodegradable can last for a long time and still be able to carry shopping items  even if they are exposed to natural environment.

Learn more about bags from

brainly.com/question/728465

4 0
3 years ago
Other questions:
  • As you move the click and type pointer around the document, the icon changes to represent ____________________ that will be appl
    10·2 answers
  • Write the 8-bit signed-magnitude, two's complement, and ones' complement representations for each decimal number: +25, + 120, +
    11·1 answer
  • A software architecture that divides an application into view, business logic, and data is called a(n) ________.â
    14·1 answer
  • Which one of the following is an example of hacktivism according to you and why?
    11·1 answer
  • Iisa is creating a resume in which section should she mention her career goals
    6·1 answer
  • A coworker is concerned about the veracity of a claim because the sender of an email denies sending it. The coworker wants a way
    6·1 answer
  • Your mom calls you. She is creating a book of poetry. Many of these poems only take up the first half of a document . She asks i
    10·2 answers
  • 10<br> Which of the following is not one of the most popular Spreadsheet software applications?
    6·1 answer
  • Which IP QoS mechanism involves prioritizing traffic? Group of answer choices IntServ RSVP COPS DiffServ None of the above
    14·1 answer
  • What is a good indicator that someone on social media is not who he or she claims to be?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!