Answer:
- Peripheral devices
Explanation:
Peripheral devices are defined as computer devices which are not the element of the essential/basic computer function. These devices can be internal as well as external and are primarily connected to the computer for entering or getting information from the computer. For example, the keyboards or mouse functions to enter data into the computer for processing and receiving information while the output devices like speakers, projectors, printers, etc. are used to get the information out of the computer.
Answer:
Iteration
Explanation:
The insertion sort is based on repetition of comparing one data array (or element in a list) with the others at its left to reorganize it, normally following a size criteria (from small to big or the other way around).
At each iteration, the algorithm takes one element and compares it one by one to the others until it fit the specified criteria. Later on, it creates a space, moving the other elements, to insert it. Later, it goes to the next element and the iteration repeats all the way through. It has some advantages over other sorting algorithms because it is easy to deploy and program it in many different languages, but at the same time it can be terribly slow when sorting large amount of data.
Answer:
User-level Security
Explanation:
User-level security allows the user to access resources on a network using a username and password. User-level security offers higher and greater security than share-level security, which does not require a password to access files.
User-level security allows the database user access and permission to resources.
<span>They include programs that help people do certain tasks. They include programs that control a computer. They store information being used by the CPU.</span>