1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tomtit [17]
4 years ago
12

This type of peripheral is used to interact with, or send data to, the computer.

Computers and Technology
2 answers:
9966 [12]4 years ago
6 0
The Input is what that is for
AVprozaik [17]4 years ago
6 0
The answer to this would be the memory. i hope this helps.
You might be interested in
Look at the graph. What is the meaning of the point shown with a star
RUDIKE [14]
The answer is B. 1 Box= 1/2 Pounds
4 0
3 years ago
Which keyboard shortcut can you use to copy data from a cell? HURRY UP PLZ RIGHT NOW HURRY.
Romashka-Z-Leto [24]
The keyboard shortcut used to copy data from a cell is A.) Ctrl + c command +C

I hope this helped!! :)
7 0
3 years ago
Read 2 more answers
Which of the following hardware developments allow objects to connect to a network and share data with any other application, se
Norma-Jean [14]
Server and device both are useful to object to connect to a network and share data with any other application.
5 0
3 years ago
Alex recently earned his security certification and has been offered a promotion to a position that requires him to analyze and
nikitadnepr [17]

Alex recently earned his security certification and has been offered a promotion to a position that requires him to analyze and design security solutions as well as identifying users’ needs.Alex been offered

A.Security administrator

Explanation:

  • A security systems administrator handles all aspects of information security and protects the virtual data resources of a company.
  • They are responsible for desktop, mobile, and network security, and are also responsible for installing, administering and troubleshooting an organization's security solutions.
  • A security administrator is the point person for a cybersecurity team.
  • A Security Administrator installs, administers, and troubleshoots an organization's security solutions.
  • The Security Administrator will ensure the network's security, protect against unauthorized access, modification, or destruction, and troubleshoot any access problems

3 0
4 years ago
Some file formats are specific to the program that uses them and the operating system on which they are used. True or False
mina [271]

Answer:

true

Explanation:

certain file formats can only be used to it's own operating system

5 0
4 years ago
Read 2 more answers
Other questions:
  • Web design people please help!
    7·1 answer
  • What file may contain data written to it in case of an unexpected error or program shut-down?
    12·2 answers
  • Which layer concerns the gateway to the network?
    10·1 answer
  • Write a program that will ask the user to input a phrase (multiple word sentence), and an integer value. A static function will
    14·1 answer
  • The R1 shell opens in a terminal window with black text and white background. What user is logged into
    8·1 answer
  • What new information, strategies, or techniques have you learned that will increase your technology skills?
    14·1 answer
  • Suppose an initially empty stack S has performed a total of 15 push operations, 12 top operations, and 13 pop operations ( 3 of
    5·1 answer
  • ¿Consideran que nuestra sociedad chilena (modelo económico, los medios de comunicación, educación, la publicidad) promueve la sa
    11·1 answer
  • 1. Wash all work surfaces with a_______ wrung in hot soapy water.
    9·1 answer
  • Which statement best describes the computers all around us?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!