1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vodka [1.7K]
3 years ago
15

2 types of input and output devices that an estate agent requires in their office.

Computers and Technology
1 answer:
GrogVix [38]3 years ago
5 0
Assuming the estate agent uses a desktop computer they're definitely going to need:

Input: Mouse, Keyboard
Output: Monitor, Printer.

Input devices are those that put data into the computer, while output is the opposite. 
You might be interested in
Five routers are to be connected in a point-to-point subnet. between each pair of routers, the designers may put a high-speed li
Natalija [7]

Let assume are lettered A to E in that order. Thus, there will be 10 potential lines: AB, AC, AD, AE, BC, BD, BE, CD, CE and DE. Each of these potential lines has 4 possibilities. Therefore, the total number of topologies is 4¹⁰=1,048,576. 1,048,576. At 100ms <span>it will take 104,857.6 seconds which is slightly above 29 hours to inspect each and one of them.</span>











6 0
3 years ago
Complete the rest of this statement:
Radda [10]

Answer:

Computer science is about how computers work, in terms of programming, design and data processing.

Explanation:

Computer science is a discipline that studies issues related to information technology and its use, including the storage, processing, presentation, and transfer of information.

The fringes of computer science extend to many other sciences: for example, usability research is closely related to psychology and bioinformatics to biology, among others. Digital media research, on the other hand, has links to media science and communications research. Computer science also has a strong interaction with computational science and information society research examining the wider effects of data processing in different areas.

4 0
3 years ago
If a fire should break out in your building, which of the following actions is NOT recommended?
quester [9]

C) Scream and run

you need to remain calm and carefully exit the building making sure you have everybody with you

6 0
4 years ago
Read 2 more answers
__________ implements a security policy that specifies who or what may have access to each specific system resource and the type
malfutka [58]

Answer: Access control

Explanation:

Access control implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance.

A typical example of this is in ERPs where access controls defines what access codes a process owner has and what access a reviewer and an approval has. Where a personnel has access to carry out a transaction, review and approve the transaction, access controls are said to be deficient.

The right answer is Access control

Hope this helps!!

6 0
3 years ago
Social engineering attacks can be carried out:______.
Alik [6]
The answer most likely B NOT SURE )
3 0
3 years ago
Other questions:
  • A user complains that he cannot access a particular website, although he is able to access other websites. at which layer of the
    5·1 answer
  • What is the value of the variable result after these lines of code are executed?
    5·2 answers
  • What is the purpose of filters in a database?
    15·1 answer
  • Marissa, a 21-year-old young woman, is working as an intern at a software company. She has recently graduated from college. She
    6·1 answer
  • Which function does the Subtotal feature use?
    5·1 answer
  • Which of the following are correct? I. Hold the middle mouse button to rotate the model on the screen. II. To pan the model, hol
    15·1 answer
  • Plzz help.... <br><br>i will mark u as brainliest if u answer correct
    10·1 answer
  • Create a new Java class called AverageWeight. Create two arrays: an array to hold 3 different names and an array to hold their w
    13·1 answer
  • 5. What are some situations where you might find it useful to use the “!” symbol in a program?
    9·2 answers
  • What is computer hadware​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!