1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lara31 [8.8K]
3 years ago
12

Explain what qualifies a device to be called a computerized system​

Computers and Technology
1 answer:
Karolina [17]3 years ago
7 0

Answer; A peripheral is a “device that is used to put information into or get information out of the computer.”[1]

There are three different types of peripherals:

Input, used to interact with, or send data to the computer (mouse, keyboards, etc.)

Output, which provides output to the user from the computer (monitors, printers, etc.)

Storage, which stores data processed by the computer (hard drives, flash drives, etc.)

Explanation:

You might be interested in
We learned that an ideal multiple access protocol has FOUR desirable
Nataly [62]

Answer:

We learned that an ideal multiple access protocol has FOUR desirable

characteristics, describe them.

Explanation:

1.- Very experienced technology and easy to implement.

2.- Rigid resource management and unfit for variable traffic flows.

3.- Requires antenna duplexer for duplex transmission.

<u>Duplex</u> <em>is a term used in telecommunication to define a system that is capable of maintaining two-way communication, sending and receiving messages simultaneously. </em>

4.- Normally FDMA is combined with multiplexing FDD.

<u>FDMA</u> (acronym in English for Frequency Division Multiple Access) <em>is a multiplexing technique used in multiple communication protocols, both digital and analog, mainly radio frequency, and among them in mobile phones of GSM networks. </em>

<u>FDD</u> (Frequency Division Duplexing in English) <em>designates a duplex method in the environment of wireless telecommunications and over certain wired networks.</em>

4 0
4 years ago
Blue light reduces quality sleep and comes from
weeeeeb [17]

the answer is electronic screens

hope this helps

3 0
4 years ago
Read 2 more answers
Ron is in the process of designing tables for a database that will contain information for all school matches played in a year.
solong [7]
Primary Key, if we define field as primary key it will not accept duplicate values.<span>
</span>
6 0
3 years ago
What correctly describes the features of the service called kickstarter?
Nikitich [7]

Kickstarter is a crowdfunding platform that offers opportunities for its users to financially invest in projects made by others users. The projects available are incredibly varied in terms of its product category ranging from technological innovations to board games. The platform has been around since 2009. Users who can post projects come from various countries, such as United Kingdom, United States, Spain, and even Hong Kong. To date, Kickstarter has managed to raise more than USD 1 billion for over 250,000 projects.

4 0
4 years ago
Read 2 more answers
You should adopt naming standards that do not convey information to potential system attackers.
Nonamiya [84]
True








------------------------------
5 0
3 years ago
Other questions:
  • A user reports that he can't connect to a specific website. you go to the user's computer and reproduce the problem. what should
    11·1 answer
  • Why is Brainly always deleting either my answers or my questions? I am putting nothing inappropriate in them. Can someone answer
    7·2 answers
  • What happens when you send a fax to a phone?
    9·1 answer
  • If a computer is capable only of manipulating and storing integers, what di themselves? How are these difficulties overcome
    13·1 answer
  • Write a function called line_numberthat takes as parameters two strings representing file names. Assume these are text files. Th
    15·1 answer
  • This function causes a program to terminate, regardless of which function or control mechanism is executing.
    12·1 answer
  • Match each label to the correct location on the image match the process to its characteristics
    14·1 answer
  • What is the advantage of learning through story compared to learning through personal experience?
    15·2 answers
  • A computer hacker trying different combinations of characters to crack a password is a ________.
    7·1 answer
  • Real life example of hexadecimal and octal decimal “for example in binary light switch”
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!