1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fiasKO [112]
3 years ago
14

What are the six peripherals of a computer system

Computers and Technology
1 answer:
Lubov Fominskaja [6]3 years ago
4 0
Peripherals fall into three categories:
1. input devices are devices that put commands inside computers such as keyboards, mouses, and joysticks but the first two are the mostly used nowadays
2. output devices are what computers give out such as monitors, printers, speakers and I think projectors also fall into that category
3.storage devices such as a optical drive, hard drive, SDD, flash drive
So the main ones might be a mouse, keyboard, monitors, I think printers, hard drives and flash drives but speakers might be considered as one instead of a flash drive.

You might be interested in
A network administrator manages a network with 75 servers. At least twenty of those servers are approaching end of life but the
Gekata [30.6K]

Answer:

Virtual servers

Explanation:

4 0
3 years ago
Charles Lyell believed that:
yuradex [85]
D: slow processes of erosion and deposition shaped the earth
8 0
3 years ago
A corporate user is attempting to connect to the company’s Windows domain server on the local network with her new laptop throug
andreev551 [17]

Answer:

B. Windows domain user name and password

Explanation:

Windows domain user name and password are login credentials required for the user to successfully sign in to the Windows domain.

The domain username and password are usually stored on a domain controller rather than on the host.

As a domain user, the computer seeks from the domain controller the privileges assigned to the user, if it gets a positive response from the domain controller, it authorizes the users login credentials without restrictions; else, it denies the user access.

8 0
4 years ago
CPT, which is used to code procedures in an office, is an example of a/an
ExtremeBDS [4]
 <span>Current Procedural Terminology

is used for general check up

</span>
3 0
3 years ago
The 169.254.78.9 ip address is an example of what type of ip address?â
saul85 [17]
The 169.254.0.0/16 network is for self-assigned addresses.
3 0
4 years ago
Other questions:
  • A security administrator is implementing a SIEM and needs to ensure events can be compared against each other based on when the
    11·1 answer
  • I am having trouble with logic gates(AND NOR,etc)
    8·2 answers
  • Write a program that reads an arbitrary number of integer that are in the range 0 - 50 inclusive and counts how many occurrences
    15·1 answer
  • Which of the following activities poses the greatest personal cybersecurity risk? A. Making a purchase on an online store that u
    13·1 answer
  • Write a Java class called getName that prompts a user for their name and then displays "Hello, [name here]!" The flow should loo
    14·1 answer
  • Anyone know the name of this font? and what site i can find it on so i can type it????
    8·1 answer
  • Will mark brainliest if correct. First come, first serve.
    10·1 answer
  • Which of these identifies the intersection of row 16 and column D?
    14·1 answer
  • Full meaning of LAN and WAN
    5·2 answers
  • Mencione 2ejemplos de procesos manuales
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!