1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Iteru [2.4K]
3 years ago
13

Computer program allowing the computer to communicate with a hardware device

Computers and Technology
1 answer:
Airida [17]3 years ago
8 0

Answer:The software that allows a computer to communicate with hardware devices is referred to by the general term known as 'Drivers.

Explanation:Transmission Control Protocol/Internet Protocol (TCP/IP) is the backbone of the Internet and the true language computers use to talk to each other. Essentially it's a set of standards for sending information from a computer's network card, through transmission lines to another network card.

You might be interested in
How fast is light? person that answers this will get points ​
Serhud [2]

299,792,458 metres per second

6 0
3 years ago
What is booting as used in computers?​
Sliva [168]

Answer:

the startup process

Explanation:

5 0
3 years ago
Read 2 more answers
How has the global marketplace used emerging technologies to expand businesses
madam [21]

Answer:

Information Technology (IT) has revolutionized the way organizations conduct business by enabling small and medium businesses to level the playing field with larger organizations. Small businesses use an array of technology based on everything from computer server stations to portable mobile devices to expand competitive advantages in the global economic marketplace and marketing environment. So, small & medium business organizations owners are considering implementing information technology (IT) in their planning process for streamlined integration. Thus, this process is leading to future business expansion locally as well as globally. This decision allows proprietors to create smooth business operations using the most effective information technology available. On the other hand, the Internet has further linked the overseas suppliers of goods and services and their buyers. During the e-commerce era, internet traffic is increasing day by day, and e-commerce business is in the hyper growth stage. Information technology tremendously helps to boost the expansion of the current and future of marketing environment; communication technology became faster than ever. Though, globalization creates a little challenge for multinational companies to share resources and knowledge across a number of businesses inside and outside the country. Outsourcing and freelancer ease this challenge because multinational companies recruit talent freelancers and outsource their projects to the highly expert vendors and then the works are done through the team of people very effectively and efficiently.

Explanation:

6 0
3 years ago
The default color scheme is called ____.
notsponge [240]
What program is this regarding?

If it's a Microsoft Office product, the default colour scheme is "office"
5 0
3 years ago
How will you keep the buzz going post-hackathon?
Anna71 [15]

Answer:

it would be nice if you gave some form of info here

Explanation:

in other words without information no help aka I'm slow and just need points

8 0
1 year ago
Other questions:
  • Besides technical skill, what is the most important factor for staying employed and being offered promotions?
    6·2 answers
  • You have just driven to the Hewlett-Packard site in Corvallis to field-interview a programmer. You sit down in a conference room
    6·1 answer
  • A sentinel value ________ and signals that there are no more values to be entered:____
    14·1 answer
  • Anyone free to inbox me plz....​
    6·2 answers
  • Which type of computer graphic can be blown up to a much larger size without getting distorted or losing quality?
    5·1 answer
  • What is the 5 basic steps of computer programing?
    6·1 answer
  • Shelby wants to move “ExpirationDate” to the top of the datasheet. What should she do?
    13·1 answer
  • 75 pts. Conduct online research about 10 of the most famous and dangerous computer viruses that threatened computer networks aro
    13·1 answer
  • A threat analyst is asked about malicious code indicators. Which indicator allows the threat actor's backdoor to restart if the
    6·1 answer
  • What type of element addresses the recovery of critical information technology (it) assets, including systems, applications, dat
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!