1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Phantasy [73]
4 years ago
11

What kind of device does a computer need to provide information to a person or something else?

Computers and Technology
2 answers:
kozerog [31]4 years ago
8 0
Very easy one 2) output device

yanalaym [24]4 years ago
7 0
An input device is something that gives information to the computer. On the other hand, an output device is something that gives you information.
You might be interested in
In dynamic programming, the technique of storing the previously calculated values is called A. Saving value property B. Storing
Pani-rosa [81]

Answer:

C. Memoization

Explanation:

Given that Memoization is a computing strategy that is applied in storing the previously calculated values such that values can easily be recalled to execute similar problems or further problems. It is also used in making recurring algorithms productive

Hence, in this case, In dynamic programming, the technique of storing the previously calculated values is referred to as MEMOIZATION

4 0
3 years ago
A bot can use a _______to capture keystrokes on the infected machine to retrieve sensitive information.
fgiga [73]

Answer:

keylogger.

Explanation:

A keylogger can be defined as a software program or hardware device designed for monitoring and recording the keystrokes entered by an end user through the keyboard of a computer system or mobile device.

Basically, a keylogger can be installed as a software application or plugged into the USB port of a computer system, so as to illegally keep a record of all the inputs or keys pressed on a keyboard by an end user.

In order to prevent cyber hackers from gaining access to your keystrokes, you should install an anti-malware software application such as Avira, McAfee, Avast, Bitdefender, Kaspersky, etc.

An antivirus utility is a software application or program that's used to scan, detect, remove and prevent computer viruses such as Malware, Trojan horses, keyloggers, botnets, adwares etc.

In conclusion, a bot can use a keylogger to capture keystrokes on the infected machine to retrieve sensitive information.

3 0
3 years ago
Is the internet useful and why
Firdavs [7]
The internet is useful because it helps us to be connected to every parts of world, we can know what's happening to other parts of world using internet.
3 0
4 years ago
Read 2 more answers
Drag the tiles to the correct boxes to complete the pairs.
Nady [450]

Explanation:

Drag the tiles to the correct boxes to complete the pairs.

Match each story-boarding technique with its appropriate description.

hierarchical

linear

webbed

wheel

The order of page navigation is inconsequential.

The flow of information is sequential.

The technique requires navigating back to the main page.

The technique orders content from generic to specific topics.

8 0
3 years ago
I am needing help with this homework of mine.
KengaRu [80]
It doesn’t show nothing in the picture
8 0
3 years ago
Other questions:
  • Your bank contacts you asking you to phone a number supplied in the email.What do you?
    13·2 answers
  • Julian is adding a column of numbers as he inputs expenses from his receipts. Holly wants to create a simple comparison between
    13·1 answer
  • Write a program which will enter information relating to a speeding violation and then compute the amount of the speeding ticket
    14·1 answer
  • What symbol shows autocorrect is in use in access? WILL MARK BRAINLIEST FOR WHOEVER ANSWERS FIRST!!!
    5·1 answer
  • Give a regular expression for binary numbers. They can be integers or binary fractions. A leading - sign is always allowed. Lead
    15·1 answer
  • Your program analyzes complex data.
    7·1 answer
  • The most effective technique of malware propagation among the following list
    7·1 answer
  • F. Practical Questions
    7·1 answer
  • A user may enter some text and the number of times (up to a maximum of 10) to repeat it. Display the text repeated that many tim
    12·1 answer
  • Find the name of the professor with the maximum percentage of students that failed his course.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!