1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Crank
3 years ago
15

The connectors on the computer allow you to plug in devices such as keyboards and printers. what are these called?

Computers and Technology
1 answer:
madam [21]3 years ago
8 0
USB port. That allows you to plug in devices.
You might be interested in
How are static variables and methods created in Java? What happens if a non-static method of a class tries to access a static va
9966 [12]

Answer:

Static variables are the variables decaraed with keyword static, static variables must be deacraled inside the class body, means we can not declare a static variable inside a method or consttructor, static variable belongs to class, for a class only one copy is created for static variable and used by all the objects/instances.

Static variable can access with class name like

X.i

Static method are the methods defined with static keyword, static method are also part of a class, we can access static meethod using class name like

X.printI()  

Explanation:

class X

{

//to create a static variable we need use static keyword with variable name like

public static int i;

// to create a static method we need to use static keyword while defining a method like

public static void printHello() {

 System.out.println("Hello");

}

/*

 * A non static method can access static variable of a class there is no issue

 * with that we can use a static variable in a non static method like

 */

public void printI() {

 System.out.println(i);

}

/*

 * As long as the class exist in JVM static variables will be there, as static

 * variable belong to class not with the instance,

 * it does not matters if there are instance exist or not

 */

}

4 0
3 years ago
Which of the following factors will have the greatest impact on your credit score? I. Length of Credit History II. Payment Histo
Veseljchak [2.6K]
<span>the one that would have the greatest impact on my credit score would be : B. II and III If you had a troublesome payment history, it would be very likely that you'll end up with credit score because you make yourself became untrustworthy and if you have a low Debt, people will trust your current financial condition and you will be more likely to earn high credit score</span>
5 0
3 years ago
Read 2 more answers
In computing, what does LAN stand for?​
Arlecino [84]

Answer:

LAN stands for Local Area Network

4 0
2 years ago
Read 2 more answers
What do rates do on Brainly?
andreyandreev [35.5K]
It just helps boost your status
7 0
3 years ago
Explain the following terms:<br><br> a) Atomicity<br><br> b) DML
GenaCL600 [577]

Answer:

a) Atomicity:- It is among the one of the ACID properties of transactions.It states that an atomic transaction is irreducible and indivisible series of data operations such that either nothing occurs or all occurs.

b) DML(Data Manipulation Language):- It is a computer programming language that is used for inserting,deleting,manipulating data in the database.For example -SQL.

6 0
3 years ago
Other questions:
  • Help plz
    5·1 answer
  • If parties in a contract are not ____, the contract can be canceled.
    12·1 answer
  • _____________ data is what is translated to digital format so it can be stored in a computer.
    10·1 answer
  • Which layer enables the receving node to send an acknowledgement?
    11·1 answer
  • We can include following item(s) during configuration itemidentification:
    10·1 answer
  • _____ include the people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines th
    11·1 answer
  • Which 3D game has Bentley the Bear collect gems while avoiding enemy trees, bees, ghosts, skeletons, and Berthilda the witch?
    9·1 answer
  • Lena is completing her senior year of college and is living in an apartment with three friends. Her family has a subscription to
    14·1 answer
  • Purpose In this lab activity, you will be introduced to the concept of enriching data with SPLUNK. This three-hour course is for
    5·1 answer
  • An embedded system describes computing technology that has been enclosed in protective shielding for security reasons. True or f
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!