Correct answer: Neither
The CPU<span> is also known as the </span>processor<span> or microprocessor. The </span>CPU<span> is responsible for executing a sequence of stored instructions called a program. This program will take </span>inputs<span> from an </span>input<span> device, process the </span>input<span> in some way and </span>output<span> the results to an </span>output<span> device.</span> It is neither an input nor an output device, but it is usually connected to both kinds of devices.
Output devices like your monitor, speaker, and printer does not process anything fo it to be categorized as a processing device like your CPU and so as input devices like your mouse, microphone, and keyboard.
Answer:
"LinkedIn" is the correct answer for the above question.
Explanation:
- LinkedIn is used to build a connection between people and communicate. But it is used to connect only business type contacts.
- So, when any user wants to make any business type of contacts, then he can do this with the help of making an account on LinkedIn and then add the business people on it.
- The above question asked about the networking site which is used to connect the business contacts. This site is known as LinkedIn.
Answer:
The answer to the following question is "Autofilter".
Explanation:
Filtering is a technique for finding some data of a group of data or tables. Autofilter is a part of the Microsoft excel. In this filter it allows you to view specific rows in a spreadsheet while hiding the other rows. In other databases like Oracle Database, MySQL, MongoDB, etc. it is the same as a select command.
Answer:
Data is encrypted on SSH
Explanation:
Telnet and SSH both are the networking protocols. These protocol are used for the security of data. In telnet data is sent over the link without any encryption. That is the reason, in telnet protocol data is less secure.
In SSH (Security Shell) protocol data has been encrypted before transmission. The encryption of data make it more secure between transmitter and receiver.
So the true statement is that, SSH has data encryption.