1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paul [167]
3 years ago
9

How can i add card reader to pc answers?

Computers and Technology
1 answer:
EastWind [94]3 years ago
7 0
If your trying to put one in you cant with out destroying ur pc 
You might be interested in
You’re creating a table for one of your slides, and need to make some modifications to your table structure. Which of the follow
lyudmila [28]

Create comment it’s the only one there

3 0
3 years ago
Read 2 more answers
True or False: The major advantage of Arrays over ArrayLists in Java is the fact that while ArrayLists are fixed in size, an Arr
Hatshy [7]

Answer:

False

Explanation:

It's the other way round actually. Arraylists do not have fixed size and can increase or decrease in size as needed. On the other hand, Arrays are fixed from when they are declared; they have a particular size that number of elements cannot go beyond.

An arraylist in Java is a class that is part of a Java collection framework(java.util) that can have variable sizes and only store objects, not primitive data like strings or integers. An array is a data structure in Java and can store both primitive data and objects, while having a fixed size at declaration.

5 0
3 years ago
A _____ network is where all computers are equal and each one is both data requester and data provider.
andre [41]

Answer:

peer-to-peer network

Explanation:

i think i'm not sure though so tell me if it is wrong :)

8 0
3 years ago
Write a function that takes as input a single integer parameter n and computes the nth Fibonacci Sequence number. The Fibonacci
RSB [31]

Answer:

Following are the code to this question:

def Fibonacci(n):#defining a method Fibonacci that accept a parameter

   a = 1#defining a variable a that holds a value 1

   b = 1#defining a variable b that holds a value 1

   if n <= 0:# Use if to check n value

       print("invalid number")#print message

   elif n == 2:#defining elif that check n equal to 2

        return 1#return 1

   else:#defining else block

       print(a)#print value of a

       print(b)#print value of b

       for i in range(2,n):#defining for loop to calculate series

           s = a + b# add value in s variable

           a = b # interchange value

           b = s# hold s value

           print(s)#print s value

Fibonacci(10)#calling method

Output:

1

1

2

3

5

8

13

21

34

55

Explanation:

In the above-given program code, a method "Fibonacci" is defined, which holds a value "n" in its parameter, and inside the method two-variable "a and b" is defined, that holds a value "1".

  • In the next step, if a block is defined that checks n value is less than equal to 0, it will print "invalid number" as a message.
  • In the elif, it checks n value is equal to 2 it will return a value that is 1.
  • In the else block, it will calculate the Fibonacci series and print its value.
4 0
3 years ago
Which term refers to actions that you would typically perform on a computer to revive it if it functions in an unexpected manner
andriy [413]
There are many answers to this question. The first step is normally a reboot, second, I would check witch task or service is taking up all the CPU cycles and check the system and error logs. The list goes on... I'm not sure how detailed you want to get.
5 0
4 years ago
Read 2 more answers
Other questions:
  • In your memo, give three new employees directions for starting the computer and opening a word-processing document.
    9·1 answer
  • • Two advertisers A and B
    8·1 answer
  • When using correct ergonomic technique be sure to
    6·2 answers
  • The function below takes two parameters: a string parameter: CSV_string and an integer index. This string parameter will hold a
    14·1 answer
  • A _______________ is a security threat that may launch a worm through a Trojan horse or launch a denial-of-service attack at a t
    10·1 answer
  • In an information systems framework, ________ is the bridge between the computer side on the left and the human side on the righ
    14·1 answer
  • Seneca has just applied conditional formatting and realizes that she has made a mistake. Which action should she take to fix the
    12·2 answers
  • Working with text in presentation programs is very ____ using text in other applications.
    10·1 answer
  • Explain the following IT terms Network: Packet: Router: IP address: Server: LAN: WAN: Bus topology: Ring topology: Star topology
    5·1 answer
  • what uses gps tracking to track vehicles? group of answer choices edge matching. cartography. automatic vehicle location. geogra
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!