1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rasek [7]
3 years ago
13

Which of the following is an input device? (Select all that apply)

Computers and Technology
1 answer:
liq [111]3 years ago
4 0
A. keyboard and b. touch pad
You might be interested in
What is the most important external issue when using social media in emergency management?
DerKrebs [107]
Th e most important external issue when using social media in emergency management is the disaster response. Disseminating information through social media is very effective especially when there are calamities and a disaster respond from both private and public sector is very urgent.
8 0
3 years ago
What is the current record holder for the fastest car in the world? What is the top speed of it? 100 points to whoever gets it c
olchik [2.2K]
It’s 257 mph

Hope this helps !!!!!
7 0
3 years ago
Read 2 more answers
Discuss the potential problems using biometrics can present to society, and in particular, what effect the loss of biometric rec
tamaranim1 [39]

Answer:

Biometrics in this sense refers to any human information that can be used as unique identifiers such as fingerprints, iris scan, facial scan, voice patterns and typing cadence.

The advantage of biometrics is that they can not be duplicated. That is, two people can never share the same biometric information except if they are clones of each other.  

Given that this kind of unique identifiers can be also be stored as data, it thus creates a cyber risk. If stolen, it may be used to access any part of the user's life. The loss of biometric data to hackers is so detrimental that it can be used to falsify legal documents, identifications documents, or other forms of and even credit card details.

Cheers!

7 0
3 years ago
1. Information integrity ensures that data can be modified only by appropriate mechanisms.
GrogVix [38]

Answer:

1. True

2. True

3. False

4. False

Explanation:

1. Information integrity is a term in computer business that describes the degree of accuracy, reliability and dependency of an information content, process and system.

The main purpose of Information integrity is to prevent or protect information from accidental or intentional but unauthorized changes.

Hence, it helps to ensure that data can be modified only by appropriate mechanism.

2. Pairing threats with vulnerabilities is a pair of risk analysis, that sets to determine the type of vulnerabilities a system or organization has, which can be paired with valid threats. Hence, the kind of risk involved in the vulnerability threats, can then be addressed.

3. Knowledge based identification (authentication) system which involves password or PIN are the most common form of authentication methods. Ranges from different devices such as phones and PC to platform such as website.

4. Biometric is a type of user authentication that relies on the measurement and calculation of the shape of the body, such as fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odour/scent. It is often referred to as Physiological characteristics of Biometric system.

6 0
4 years ago
Read 2 more answers
here is an email written by Michelle to Pattie what is the main netiquette violation in sentence b ?​
Artyom0805 [142]

Answer:

Using unfamiliar abbreviations and acronyms

Explanation:

because he using RHFD and LTRE

4 0
3 years ago
Other questions:
  • Twitter is an example of a __________. social bookmarking website social tagging website microblogging website blogging website
    12·1 answer
  • Georgenotfound??? question mark??
    15·2 answers
  • What is an accurate definition of a goal?
    15·2 answers
  • Do all light bulbs server a practical purpose?
    14·1 answer
  • Look at the following code.int x = 7;int *iptr = &x;What will be displayed if you send the expression *iptr to cout ? What h
    8·1 answer
  • Which one is the correct answer
    13·1 answer
  • Why is it so important to have employees who can critically think?
    7·2 answers
  • Which relation is created with the primary key associated with the relationship or associative entity, plus any non-key attribut
    6·1 answer
  • Create a game that rolls two dies (number from 1 to 6 on the side) sequentially for 10 times (use loop). If at least once out of
    14·1 answer
  • There are many ways you can improve the performance of a website from an SEO perspective. When it comes to link building, which
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!