1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sonbull [250]
3 years ago
14

What are the 6 external parts of a computer

Computers and Technology
1 answer:
Sedbober [7]3 years ago
8 0

External computer components connect to the motherboard through a series of ports on the computer case. Many components have their own dedicated port connections, such as those to connect audio equipment or the computer monitor. Others may share a single type of connector, such as the USB, that connects everything from keyboards and mice to game pads and external hard drives. there


You might be interested in
why is it useful to learn how to solve and program solutions with a limited set of command in computer science
12345 [234]

Answer:

Give at least one reason why it's useful to learn how to solve and program solutions with a limited set of commands. So that when there is more commands we know how to use the ones we have. parameters help generalize the solution to a specific problem. how are functions with parameters an example of abstraction?

4 0
1 year ago
For a class Foo, one difference between a variable declared Foo * and a variable declared Foo & is that only the variable de
Studentka2010 [4]

Answer:

False.

Explanation:

When we declare a variable as reference type we have to initialize that variable otherwise the compiler will give error that the reference variable is not initialized.You also cannot initialize the variable Foo& with NULL value because it is a reference variable and we have to initialize it.

On the other there is no need to initialize the variable Foo * since it is a pointer it can also store NULL value.

So the answer is only Foo* can store NULL value not Foo &.

5 0
3 years ago
What term describes the process of transferring information from one computer to another
Flauer [41]

Syncing or maybe FTP or connection

5 0
3 years ago
The Sieve of Eratosthenes is an elegant algorithm for finding all the prime numbers up to some limit n. The basic idea is to fir
IRISSAK [1]

Answer:

Check the explanation

Explanation:

#!usr/bin/python

#FileName: sieve_once_again.py

#Python Version: 2.6.2

#Author: Rahul Raj

#Sat May 15 11:41:21 2010 IST

 

fi=0 #flag index for scaling with big numbers..

n=input('Prime Number(>2) Upto:')

s=range(3,n,2)

def next_non_zero():

"To find the first non zero element of the list s"

global fi,s

while True:

if s[fi]:return s[fi]

fi+=1

def sieve():

primelist=[2]

limit=(s[-1]-3)/2

largest=s[-1]

while True:

m=next_non_zero()

fi=s.index(m)

if m**2>largest:

primelist+=[prime for prime in s if prime] #appending rest of the non zero numbers

break

ind=(m*(m-1)/2)+s.index(m)

primelist.append(m)

while ind<=limit:

s[ind]=0

ind+=m

s[s.index(m)]=0

#print primelist

print 'Number of Primes upto %d: %d'%(n,len(primelist))

if __name__=='__main__':

sieve()

4 0
2 years ago
A company monitors the performance of all web servers using WMI. A network administrator informs the security engineer that web
Virty [35]

Answer:

The correct answer to the following question is option A). Install a HIPS on the web servers

Explanation:

HIPS stands for Host-Based Intrusion Prevention System or Host Prevention System.

HIPS is the program or system which protects your computer system against virus and the other malware and it also protects from unknown and known malicious attacks.

6 0
3 years ago
Other questions:
  • Explain how can you protect your computer from malware
    15·2 answers
  • A ___________ is an algorithm for which it is computationally infeasible to find either (a) a data object that maps to a pre-spe
    5·1 answer
  • Write a loop statement to count and display the number of positive integers in the array. That is, your loop should display the
    14·1 answer
  • To keep from overwriting existing fields with your Lookup you can use the ____________ clause.
    14·2 answers
  • Insecurely attached infants who are left my their mothers in an unfamiliar setting often will
    14·1 answer
  • How do i unblock website on my school computer
    7·2 answers
  • What is variable declaration in java ​
    6·2 answers
  • Who was the father of computer​
    10·1 answer
  • A photographer stores digital photographs on her computer. In this case the photographs are considered the data. Each photograph
    6·1 answer
  • What is the answer for this
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!