1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IRISSAK [1]
4 years ago
10

What type of devices are the key board and the mouse?

Computers and Technology
1 answer:
Lubov Fominskaja [6]4 years ago
8 0
Output device - keyboard
Input device- mouse
You might be interested in
In a black box model are the customers told that they should be expecting to be haxked?
Licemer1 [7]
Uhhhhhhhhhhh maybe tbh i have noooo idea.
6 0
3 years ago
Please check my answer! (Java)
marin [14]

Yep. 4 rows of 5 stars each.

8 0
3 years ago
. The first step in devising security services and mechanisms is to develop a security policy True False
Evgen [1.6K]

Answer: True

Explanation: For the creation of the security services and function the first step is having a policy regarding the security measure that is to be taken.Security policy consist of the procedures and function that should be implement in the system as a plan.

It monitors the flow,accessing of external component ,data assessment etc fro the protection.After the policies are made then the implementation take place. The most common deployment of this policy is in information technology(IT)sector .Thus, the given statement is true..

5 0
3 years ago
Which of the following statements is true?
Ainat [17]

Answer:

ii,iii,iv

Explanation:

####

4 0
3 years ago
Full form of http.<br>wrong answer will be reported ​
vodomira [7]

Answer:

So it is Hyper Text Transfer Protocol.

Hope it helps

6 0
3 years ago
Read 2 more answers
Other questions:
  • Given the following code, what is output by the method call, mystery(6 * 8)?
    8·1 answer
  • With respect to the general classes of computers, a ________ is the most expensive and most powerful kind of computer, which is
    7·1 answer
  • Why is it a mistake to put e-mail address of people who don't know each other in the "to:" field
    9·2 answers
  • Which four of the following hardware components are specifically used to enable networking and are not part of a stand-alone com
    13·2 answers
  • Fair Use means a teacher can take the contents of a web activity page and repost it in your school's web site because it is for
    7·1 answer
  • Which of these is one of the primary concerns for protecting your family when online?
    9·2 answers
  • 1) SuperFetch is a memory-management technique that a) determines the type of RAM your system requires. b) makes the boot-up tim
    7·1 answer
  • Random.choice will choose a number between 1 and 100. True False​
    6·1 answer
  • When solving a problem in a group situation, which of the following traits should be demonstrated?
    8·1 answer
  • What statement describes the last step in evaluating<br> information?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!