1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hitman42 [59]
3 years ago
7

The two key elements of any computer system are the____and the _____.

Computers and Technology
1 answer:
Virty [35]3 years ago
8 0
Easy.
Hardware and software!
Did you ever try to use a computer with only mouse and monitor?
You might be interested in
Under which menu would you be able to see the number of continuous track minutes available on each mounted hard drive at the cur
Crazy boy [7]

Answer:

looooollll

Explanation:

yooooooooo u good

3 0
2 years ago
Why are the READ and DATA statements used<br>together?​
3241004551 [841]

Explanation:

DATA statements are used in conjunction with READ statements. Together they assign numbers or strings to variable names.

4 0
3 years ago
Fill in the correct term to complete the statement. _____ refers to borrowing money from a bank.
Vera_Pavlovna [14]

taking a guess here : a lone.

hope this helps.

4 0
3 years ago
Read 2 more answers
Terminal emulation, especially the unprotected ____________________ protocol, should be blocked from any access to all internal
Ivahew [28]

Answer:

telnet

Explanation:

<h2><u>Fill in the blanks </u></h2>

Terminal emulation, especially the unprotected <u>telnet </u>protocol, should be blocked from any access to all internal servers from the public network.

4 0
3 years ago
Victoria has a .... of playing with her hair when she gets nervous​
IrinaK [193]

Answer:

Victoria has a tendency of playing with her hair when she gets nervous.

Explanation:

I believe this is what you are asking for.

:))))

6 0
3 years ago
Other questions:
  • Constructors ________. initialize instance variables when overloaded, can have identical argument lists when overloaded, are sel
    11·1 answer
  • Give a logical expression with variables p,q, and r that is true if p and q are false and r is true and is otherwise false.
    5·1 answer
  • This procedure protects against the loss of data
    5·1 answer
  • Drive-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network serv
    5·1 answer
  • List the names of 3 computer scientists
    6·2 answers
  • 50 points!!!!!
    9·2 answers
  • What is the turns ratio of the transformer T10261
    5·1 answer
  • Miley met up with a bunch of her college friends after several years. She told them that she works for the sound department of a
    5·1 answer
  • Key Vocabulary:
    7·1 answer
  • You find a picture of a famous department store online that would be great to include in a project of yours. What should you do
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!