1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
FrozenT [24]
3 years ago
9

What type of hardware enables users to interact with a computer? Check all that apply. the CPU the hard disk drive the keyboard

the monitor the mouse
Computers and Technology
2 answers:
valentina_108 [34]3 years ago
6 0

Answer:

the keyboard

the monitor

the mouse

Explanation:

just took test

kirza4 [7]3 years ago
5 0

Answer:

the keyboard, the monitor, and the mouse.

Explanation:

i got it right on edge 2020

You might be interested in
Host A and B are directly connected with a 100 Mbps link. There is one TCP connection between the two hosts, and Host A is sendi
ElenaW [278]

Answer:

Host A and B directly connected to Mbps link.they receive buffer to fill up the fact that Host A will sending in Mbps data faster than B removing the data from it.Once buffer has filled.Host B send a message to Host A to stop sending data then Host B sending a TCP to Host A.Then buffer will fill up again and this process will repeat.

4 0
3 years ago
How many total bits are required for a direct-mapped cache with 128 blocks and a block size of 8 bytes, assuming a 4GB main memo
Marysya12 [62]

Answer:

32

Explanation:

Total bits will be 32 only as address is of 32 bits

(meaning to ask the size of the cache)

7 0
2 years ago
The most serious security threat to Bluetooth-enabled devices is ____, which occurs when a hacker gains access to the device and
Semmy [17]

The most serious security threat to Bluetooth-enabled devices is \sf\purple{bluebugging}, which occurs when a hacker gains access to the device and its functions without the owner's consent.

\large\mathfrak{{\pmb{\underline{\orange{Happy\:learning }}{\orange{.}}}}}

6 0
3 years ago
Which one of the following features can control left and right indents on using markers
QveST [7]
The Feature that can control left and right indents on using markers is Ruler.  The indent marker consists of two triangles and a rectangle.  <span>To change the left indent, click on the very bottom of the indent marker, the rectangle, and drag it to a new position.</span>  <span>The Right Indent is indicated by a single triangle on the Ruler at the current right margin. Click and drag it to change the margin.</span>
3 0
3 years ago
IP ______ occurs when an intruder computer fools a network into believing its IP address is associated with a trusted source.
Veseljchak [2.6K]

Answer:

Spoofing

Explanation:

Spoofing that occurs when an intruder computer fools network into believing its IP address is associated with trusted source

5 0
2 years ago
Other questions:
  • The picture that graphically represents the items you use in Windows is called a/an
    12·2 answers
  • Instructions:Drag the tiles to the boxes to form correct pairs.
    11·2 answers
  • Write a program that uses for loops to perform the following steps: Prompt the user to input two integers: firstNum and secondNu
    15·1 answer
  • What is the fastest way to locate a record for updating?
    6·1 answer
  • Can you combine a wireless and wired lan in the same home
    14·1 answer
  • Provide examples of the cost of quality based on your own experiences
    14·1 answer
  • Which of these is an online presentation tool?
    9·2 answers
  • Jane receives an email claiming that her bank account information has been lost and that she needs to click a link to update the
    13·1 answer
  • ______________ is a raw fact about a person or an object
    6·1 answer
  • A technology _________ occurs when the ability of a company to operate is impaired because of a hardware, software, or data outa
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!