1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lara31 [8.8K]
3 years ago
12

Explain what qualifies a device to be called a computerized system​

Computers and Technology
1 answer:
Karolina [17]3 years ago
7 0

Answer; A peripheral is a “device that is used to put information into or get information out of the computer.”[1]

There are three different types of peripherals:

Input, used to interact with, or send data to the computer (mouse, keyboards, etc.)

Output, which provides output to the user from the computer (monitors, printers, etc.)

Storage, which stores data processed by the computer (hard drives, flash drives, etc.)

Explanation:

You might be interested in
How do you stop getting emails from brainly saying "sarah from brainly has answered your question"
Alina [70]

Answer:

One best way to prevent from getting some emails from Brainly that are a bit annoying when you get there notifications from there, here are some ways you can get rid of those notifications below;

At the More options icon you can press it and if you see the word unsubscribe you can press it. The picture above shows a part of the instruction. This more options icon is :

At the More options icon you can also press block and you will no longer receive a notification from this app. thats the best i can do Explanation:

3 0
2 years ago
Missy creates a personal budget. She enters her current savings account balance in cell D3. In cell A3, she calculates her incom
sammy [17]
D3+(A3-B3) If you think of the future income and expenses then you can infer the expenses will lower the income amount so we use parenthesis and since there is money already in the account you would simply add that to the future total. <span />
7 0
3 years ago
Read 2 more answers
Which piece of personal information do websites often require users to enter?
Tatiana [17]
<h2>Answer: <u><em>The most common type of information that a website will ask you for is a password, which is unique to that site. Eye color is irrelevant for sites since there are only about 5 possible colors for human eyes. Most of the time there is no practical use for that information.</em></u></h2>

Explanation:

<h2><u><em>Hope this helps</em></u></h2>
7 0
4 years ago
Read 2 more answers
This question involves the implementation of the PasswordGenerator class, which generates strings containing initial passwords f
liq [111]

The following code will be used for the PasswordGenerator class.

<u>Explanation:</u>

import java.util.Random;

public class PasswordGenerator {

   private static int passwordsGenerated =0;

   private static Random random = new Random();

   private String prefix;

   private int length;

   public PasswordGenerator(int length,String prefix) {

       this.prefix = prefix;

       this.length = length;

   }

   public PasswordGenerator(int length) {

       this.prefix = "A";

       this.length = length;

   }

   public String pwGen(){

       String pwd= this.prefix+".";

       for(int i=1;i<=this.length;i++){

           pwd+=random.nextInt(10);

       }

       passwordsGenerated+=1;

       return pwd;

   }

   public int pwCount(){

       return passwordsGenerated;

   }

   public static void main(String[] args) {

       PasswordGenerator pw1 = new PasswordGenerator(4,"chs");

       System.out.println(pw1.pwCount());

       System.out.println(pw1.pwGen());

       System.out.println(pw1.pwGen());

       System.out.println(pw1.pwCount());

       PasswordGenerator pw2 = new PasswordGenerator(6);

       System.out.println(pw2.pwCount());

       System.out.println(pw2.pwGen());

       System.out.println(pw2.pwCount());

       System.out.println(pw1.pwCount());

   }

}

8 0
3 years ago
All of the following are methods to improve the communication of your key messages EXCEPT:
uysha [10]

Answer:

Fill the slides with images and animations

Explanation:

these will most likely distract the audience

6 0
3 years ago
Read 2 more answers
Other questions:
  • WHAT SHOULD YOU DO IF AN ONCOMING CAR AT NIGHT APPROACHES WITH ITS HIGH-BEAMS ON?
    6·1 answer
  • Why is it difficult to enforce laws against intellectual theft?
    10·1 answer
  • Sofia is reading a difficult text for class and worries that she won't complete it by the given deadline. How can a text-
    13·2 answers
  • 1.Context clues can be used to determine the ________of an unfamiliar word
    5·2 answers
  • What default length is used for the ospf dead interval?
    14·1 answer
  • What is the different between ethical and legal issues?​
    6·1 answer
  • Exercise 4: Bring in program grades.cpp and grades.txt from the Lab 10 folder. Fill in the code in bold so that the data is prop
    12·1 answer
  • Plz tell me how to get my deleted account back you will be highly PRAISED!!!!!!!!!!
    14·2 answers
  • Return a version of the given string, where for every star (*) in the string the star and the chars immediately to its left and
    11·1 answer
  • Some hackers are skillful computer operators, but others are younger inexperienced people who experienced hackers refer to as?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!