1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lara31 [8.8K]
3 years ago
12

Explain what qualifies a device to be called a computerized system​

Computers and Technology
1 answer:
Karolina [17]3 years ago
7 0

Answer; A peripheral is a “device that is used to put information into or get information out of the computer.”[1]

There are three different types of peripherals:

Input, used to interact with, or send data to the computer (mouse, keyboards, etc.)

Output, which provides output to the user from the computer (monitors, printers, etc.)

Storage, which stores data processed by the computer (hard drives, flash drives, etc.)

Explanation:

You might be interested in
Jensen is a senior developer for Hackers R'Us, a company that helps secure management information systems. Jensen's new task is
Harlamova29_29 [7]

Answer:

b. white-hat hacker

Explanation:

A White-hat Hacker, also known as an Ethical Hacker is an information security specialist, known for performing penetration testing and checks in search for information and communications system's vulnerabilities on demand for his/her clients.

These efforts are meant to find security risks before someone else does, who could cause any kind of damage to the systems or unauthorized access to sensitive information

6 0
3 years ago
There are five processes A to E to run. Their burst times are 3,4,5,2 and 3 seconds respectively. Their arrival times are 0,1,5,
Sholpan [36]

Answer:

Explanation:::::::::::::::

3 0
3 years ago
The period of time during which an IDPS monitors network traffic to observe what constitutes normal network behavior is referred
horrorfan [7]

Answer: Training period

Explanation:

The training period is refers to the period of time where we can monitor all the network traffic and also observe all the networking behavior with the constitute.

  • During the training period we get a proper training about the specific topic and also get a chance to learn various types of things.

 According to the given question, in the training period an IDPS monitor is used observing the networking traffic and the network behavior. Therefore, raining period is the correct answer.

 Therefore, Training period is the correct answer.

5 0
3 years ago
Documentary photographers strive to produce what type of image?
ser-zykov [4K]
I’m pretty sure that the answer is B
4 0
3 years ago
Read 2 more answers
What does NIC stand for?
evablogger [386]
Network Interface Controller
6 0
3 years ago
Other questions:
  • Suppose two computers (A & B) are directly connected through Ethernet cable. A is sending data to B, Sketch the waveform pro
    9·1 answer
  • You are troubleshooting an interface issue on your cisco ios isr. the output of "show ip interface brief" indicates that etherne
    11·1 answer
  • What is a flash player?
    9·2 answers
  • All of the following are recommended to secure a wireless network EXCEPT:
    5·2 answers
  • A spreadsheet is an interactive computer program used for
    5·1 answer
  • ?Which programmer designs programs for applications executed on the Internet?
    11·2 answers
  • C++
    10·2 answers
  • How much does a dodge tomohawk cost for a used one?
    7·1 answer
  • To open a Google Doc in another software application, the user must first download it. True or false?
    12·2 answers
  • Write a program that prompts the user to enter their name store this value in a variable called name Prompt the user for their c
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!