1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sindrei [870]
3 years ago
10

What is the name of the output devices of an computer?

Computers and Technology
1 answer:
alexandr402 [8]3 years ago
3 0
Printer,speaker,head phones,monitor
You might be interested in
What is ur Favorite anime
jok3333 [9.3K]

Answer:

one piece lol

Explanation:

8 0
3 years ago
An IT company has a HealthCare application with data security requirements such that the encryption key must be stored in a cust
babunello [35]

The S3 encryption, <u>Server-Side Encryption with Customer-Provided Keys (SSE-C)</u>, allows the company to leverage Amazon S3 for storing data with given constraints.

What do you mean by S3 encryption?
S3 encryption <u>encrypts your </u><u>data </u><u>when it is written to disks in its </u><u>data </u><u>centers at the </u><u>object </u><u>level and decrypts it for you when you </u><u>access </u><u>it.</u> There is no distinction between accessing encrypted or unencrypted items as long as you authenticate your request and you have access permissions.

S3 encryption<u> </u><u>encrypts an item before saving it to disk when you use server-side </u><u>encryption</u><u>; the </u><u>object </u><u>is then decrypted when you download the object</u>. S3 encryption lets you safeguard the data you store in AWS S3 buckets online, which is crucial for sensitive data.

To learn more about S3 encryption, use the link given
brainly.com/question/9979590
#SPJ4

4 0
1 year ago
A software is made from​
andriy [413]

Answer:

Two or more languages are used for making one particular software.

5 0
2 years ago
Liam noticed someone had accessed his social media account and made several posts without his knowledge. Which of the following
jok3333 [9.3K]

Answer:

Liam could

1) Change the password

Be sure to change the password to a "strong" one (containing lots of characters, numbers, symbols) so that way the password would be difficult to guess.

2) Avoid logging onto social media on public computers or WiFi connections.

Using public WiFi leaves you vulnerable to someone accessing your information through Internet traffic. If you do use public computers, just make sure to log out.

3) Avoid giving out account information to friends and avoid opening suspicious links and emails.

Opening suspicious links or emails could allow malware to infect your computer the moment you open them. Friends can unknowingly share these links that are designed to steal information.

I hope this helped <3 please lmk if there's anything more to add.

4 0
3 years ago
A _________ is a series of commands and instructions that you group together as a single command to accomplish a task automatica
melamori03 [73]
A macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically.
8 0
3 years ago
Other questions:
  • Pix blocks półfinały skilled
    7·1 answer
  • Public static String doSomething(String s) { final String BLANK = " "; //BLANK contains a single space String str = ""; //empty
    6·1 answer
  • Before the electronic era information was usually directly communicated and not recorded, much of the information you received w
    9·1 answer
  • Which of the following is NOT one of the Big 3 Google Applications that we discussed?
    9·2 answers
  • Radar devices are used by law enforcement to be sure that individuals are driving safely. They tell the officer how fast the veh
    12·1 answer
  • Write code which takes inputs and creates two Rectangle objects (using the edhesive.shapes.Rectangle class) and compares them us
    7·1 answer
  • Please help me I need a help
    13·1 answer
  • Pls help it’s on a test!! no links :) you can zoom in if hard to read
    15·1 answer
  • A company database needs to store information about employees (identified by ssn, with salary and phone as attributes), departme
    7·1 answer
  • Does watching Beastars make me a furry? ​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!