1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergeinik [125]
3 years ago
14

list the sixth external parts of a computer system and identify which are output and which are input devices

Computers and Technology
2 answers:
Annette [7]3 years ago
6 0
Monitor -> output

Mouse -> input

Speakers -> output

Keyboard -> input

Microphone -> input

Printer(basic) -> output

I've taken this class before. We went over this over and over in class.
Marianna [84]3 years ago
4 0
<em>Keyboard -----> Input device</em>
<em>Printer  --------> Output device</em>
<em>mouse ---------> Input device</em>
<em>Monitor --------> Output device</em>
<em>CD roam ------> Input device</em>
<em>Projector ------> Output device</em>
You might be interested in
Complete the following tasks. When you are finished, click Done to close the lab and move to the next question. After you click
DiKsa [7]

What would be the correct cable would be an DSL cord for the phonelines.

8 0
3 years ago
The process of deciding a court case based on the basis of previous decisions is the principle of which of the following?
Zina [86]
I believe the answer is precedent, because establishing precedent is the exact definition that you are looking for. Hope this helps!
8 0
4 years ago
The most common approach for making individual analysis is to:
stiks02 [169]

Answer:

A)predict future organizational needs.

Explanation:

It is important to perform a SWOT analysis. Which helps us predict future business needs. Highlighting strengths, weaknesses, opportunities and threats.

  1. analyzing its internal characteristics (Weaknesses and Strengths).
  2. external situation (Threats and Opportunities) in a square matrix.
8 0
3 years ago
why do programs include keyboard shortcuts for certain actions? do you prefer the mouse or the keyboard/ why?
Archy [21]
I would prefer the shortcut because it would make it easier to open tabs and close them too. but the can also help you with other stuff to .
4 0
4 years ago
A web application with an SQL server database is found to be compromised by an attacker. On examination, the email IDs of the da
Thepotemich [5.8K]

Answer:

This is what we call SQL Injection.

• SQL Injection is when an attacker compromises your database only if it is vulnerable.

• Vulnerability includes leaving an empty ""(value) or forgetting to close anything that could be attacked.

• Ways to prevent injection is to not use string concatenation.

(<em>ex.</em> "hello" + "world")

*  Use parameterized queries.

*   Immediately get rid of any unused code.

5 0
2 years ago
Other questions:
  • Which is true about POP3 and IMAP for incoming email?
    6·1 answer
  • Microsoft access does not create n:m relationships because microsoft access creates databases based on
    7·1 answer
  • Select the organizational skills that can help with
    6·1 answer
  • 5-16) (Bar Chart Printing Program) One interesting application of computers is to display graphs and bar charts. Write an applic
    10·1 answer
  • This program outputs a downwards facing arrow composed of a rectangle and a right triangle. The arrow dimensions are defined by
    11·1 answer
  • What would you have to know about the pivot columns in an augmented matrix in order to know that the linear system is consistent
    13·1 answer
  • Use the drop-down menus to answer questions about the options in the Window group. Which command allows a user to view presentat
    6·2 answers
  • What is a network computer that processes requests from a client server​
    11·1 answer
  • Explain how a magnetic hard disk drive (HDD) operates.
    12·1 answer
  • The reader can tell from the Article that __________.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!