1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
FrozenT [24]
3 years ago
9

What type of hardware enables users to interact with a computer? Check all that apply. the CPU the hard disk drive the keyboard

the monitor the mouse
Computers and Technology
2 answers:
valentina_108 [34]3 years ago
6 0

Answer:

the keyboard

the monitor

the mouse

Explanation:

just took test

kirza4 [7]3 years ago
5 0

Answer:

the keyboard, the monitor, and the mouse.

Explanation:

i got it right on edge 2020

You might be interested in
Select all that apply. Two physical things you can do to demonstrate you are paying attention to a speaker are _____ and _____.
omeli [17]
B and d ............
7 0
3 years ago
Read 2 more answers
How does a router handle a packet destined for a network that is not listed in the routing table?
kogti [31]
The packet is dropped or discarded. By default, a router will send packets to a network that has been listed in the routing table. If it happens that the network is not listed, the packet will be discarded or dropped. Packets that do not have a default route or gateway of last resort are dropped.

 






5 0
3 years ago
Identity theft, where people steal personal information, continues to be a problem for consumers and businesses. Assume that you
svetlana [45]

Answer:

Secure the personal information with complex multi-factor authentication and configure intrusion detection and prevention and a firewall.

Explanation:

Multi-factor authentication is a method of securing a client's personal information from the client's side to the data centre. It uses more than one security processes not policies. There key be three authentications process like a password, security token and biometrics or two authentications like password and biometrics or token.

The firewall and intrusion detection and prevention are vulnerability preventive method to detect and stop cyber attacks.

5 0
3 years ago
What does the Communications Decency Act of 1996 provide?
Softa [21]

Answer:

a

Explanation:

its the correct becayse

3 0
2 years ago
If you want to work on all aspects of your presentation, switch to __________ view, which displays the Slide pane, Outline pane,
oksano4ka [1.4K]

Answer:

Normal

Explanation:

3 0
3 years ago
Other questions:
  • 1) Put the following in order from smallest to largest A) 1,500,000 bytes B) 2,000 kilobytes C) 0.01 petabytes D) 1 Terabyte E)
    8·1 answer
  • When troubleshooting a desktop motherboard, you discover the network port no longer works. What is the best and least expensive
    10·1 answer
  • You are a disgruntled employee with a master’s degree in computer sciences who was recently laid off from a major technology com
    11·1 answer
  • A Unit of information containing the objects position, rotation, and scale values is called:
    13·1 answer
  • Melissa is writing a class called Cell. Which method has she set up to return a double?
    7·1 answer
  • Cloud offers better protection compare to on premise?​
    6·1 answer
  • Edhesive 9.3 code practice
    11·1 answer
  • Snippet 1: check_file_permissions.c #include
    9·1 answer
  • I NEED THIS ASAP PLS
    12·1 answer
  • Web résumés allow you to include extra graphics and images that you would not include in a traditional résumé. please select the
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!