1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fofino [41]
3 years ago
14

Software used the control a computer's hardware

Computers and Technology
1 answer:
s344n2d4d5 [400]3 years ago
3 0
<span>Software used the control a computer's hardware is drivers. I.e Video, Sound, Printer etc.</span>
You might be interested in
How will you be assigned with a mailbox with any OSP
Leona [35]

Answer:

Go to the File tab and click Options.

Click on the Mail menu at the left.

Click on the Signatures button to open the Signatures and Stationary window.

In the Email Signature tab, click New.

Type in a name for the New Signature such as Shared Mailbox Signature and click OK.

Explanation:

3 0
3 years ago
Devon keeps his commitments, submits work when it's due, and shows up when scheduled. What personal skill does Devon
mariarad [96]

Answer:

dependability

Explanation:

devon keeps his commitment

5 0
4 years ago
Read 2 more answers
Which of the following is a form of mediated communication?
damaskus [11]
<span>typically mediated communication is the use of any technical medium for transmission across time and space, or that is how Thus Davis defines it. i would say b, but it depends what sort of mediated communication you are referring to. but facebook is computer-mediated communication.</span>
3 0
4 years ago
CPT, which is used to code procedures in an office, is an example of a/an
ExtremeBDS [4]
 <span>Current Procedural Terminology

is used for general check up

</span>
3 0
3 years ago
What is the numeric range of a 16-bit unsigned binary value?
seraphim [82]
<span>A 16-bit integer can store 216 (or 65,536) distinct values. In an unsigned representation, these values are the integers between 0 and 65,535; using two's complement, possible values range from −32,768 to 32,767. Hence, a processor with 16-bit memory addresses can directly access 64 KB of byte-addressable memory.</span>
5 0
3 years ago
Other questions:
  • True or false? malware problems and other compromises of your computer information are rare.
    15·1 answer
  • Which of the following statements is correct? A. The columns will be listed in the results in the same order they are stored in
    7·1 answer
  • How could a system be designed to allow a choice of operating systems from which to boot? What would the bootstrap program need
    14·1 answer
  • Write a SELECT statement that returns the same result set as this SELECT statement, but don’t use a join. Instead, use a subquer
    12·1 answer
  • token is 64 bytes long (the 10-Mbps Ethernet minimum packet size), what is the average wait to receive the token on an idle netw
    6·1 answer
  • Input a list of positive numbers, terminated by 0, into an array Numbers[]. Then display the array and the largest and smallest
    11·1 answer
  • Do you ever wonder what types of media you will be using five years from now or when you graduate from college or a training pro
    9·1 answer
  • Explain why the computer is powerful working tool???​
    7·1 answer
  • Write a program that uses a stack to test input strings to determine whether they are palindromes. A palindrome is a sequence of
    7·1 answer
  • How many pages is 1500 words double spaced 12pt font?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!