1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RideAnS [48]
3 years ago
9

Which of the following can be both an input device and an output device? mouse. keyboard. display screen. laser printer .

Computers and Technology
1 answer:
dusya [7]3 years ago
7 0

Answer:mouse

Explanation:because you have the choice to use it or not

You might be interested in
Many programmers today use a(n) _________, which is software that helps them build their computer programs. eula cad sdlc ide
kipiarov [429]
The answer is Integrated Development Environment (IDE). Many programmers today use Integrated Development Environment (IDE) which is a software that helps them build their computer programs. It gives complete facilities to computer programmers for software development.  
8 0
3 years ago
Visual media that gives the appearance of a movement can be a collection of graphics<br>​
krok68 [10]

its called animation, a collection of a movement of graphics.

6 0
2 years ago
Read 2 more answers
What best determines whether a borrower's interest rate on an adjustable rato loan goes up or down?
Lelu [443]

Answer:

a bank finances

Explanation:

the best determines whether a borrower's investment on an adjustable-rate loan goes up or down is the current market. The market's condition drastically impacts the rate of investment.

8 0
2 years ago
Read 2 more answers
4
kupik [55]

Answer:

the answer is D Smart Object

5 0
3 years ago
Read 2 more answers
Adam is evaluating the security of a web server before it goes live. He believes that an issue in the code allows an SQL injecti
givi [52]

The term vulnerability describes the issue that Adam discovered.

b. vulnerability

<u>Explanation:</u>

SQL injection attack is an attack in which an external party can execute SQL commands on the database that serves as a back-end for a particular website. The SQL commands can be used to modify the contents of the website, modify the records, delete the records, and retrieve confidential information as well.  

As Adam believes that the code has an issue that allows a SQL injection attack, the term that best describes the issue that he discovered is vulnerability. The website is vulnerable since the code does not have a proper procedure to tackle a situation of SQL injection attack.

7 0
3 years ago
Other questions:
  • Consider the partially-filled array named a. What does the following loop do? (cin is a Scanner object)int[] a = {1, 3, 7, 0, 0,
    6·1 answer
  • the piece of hardware that contains the circuitry that processes the information coming in to the computer
    13·1 answer
  • Given an array of n distinct integers,d = [d[0], d[1],.., d[n - 1]], and an integer threshold, t, how many (a,b,c) index triplet
    11·1 answer
  • Image
    9·1 answer
  • When activated, an Excel object has all the features of an Excel ______?
    9·2 answers
  • You are required to copy in your attendees' emails from outside of Outlook when creating a meeting
    6·2 answers
  • 1
    7·1 answer
  • When you purchase donuts, they come in boxes of 12, so 24 donuts take 2 boxes. All donuts need to be in a box, so if you buy 13
    10·1 answer
  • _______________ ________________ have human editors that evaluate, select, and organize websites into a hierarchy of categories.
    11·1 answer
  • Is there a way of how to delete this if so pleas tell me
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!