1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sonbull [250]
4 years ago
14

What are the 6 external parts of a computer

Computers and Technology
1 answer:
Sedbober [7]4 years ago
8 0

External computer components connect to the motherboard through a series of ports on the computer case. Many components have their own dedicated port connections, such as those to connect audio equipment or the computer monitor. Others may share a single type of connector, such as the USB, that connects everything from keyboards and mice to game pads and external hard drives. there


You might be interested in
A security administrator is reviewing the following information from a file that was found on a compromised host: Which of the f
Roman55 [17]

Answer:

C. Trojan

Explanation:

In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.

This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.

In this scenario, a security administrator is reviewing the following information from a file that was found on a compromised host: "cat suspiciousfile.txt."

Some of the ways to prevent vulnerability in a network are;

1. Ensure you use a very strong password with complexity through the use of alphanumerics.

2. You should use a two-way authentication service.

3. You should use encrypting software applications or services.

8 0
3 years ago
A recipe for deducing the square root involves guessing a starting value for y. Without another recipe to be told how to pick a
Gnoma [55]

Answer:

TRUE

Explanation:

TRUE - A recipe for deducing the square root involves guessing a starting value for y. Without another recipe to be told how to pick a starting number, the computer cannot generate one on its own.

5 0
3 years ago
What is most likely to happen to the purchasing power of money over time?
natima [27]

Answer:

A

Explanation:

6 0
3 years ago
Please help!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Pie
I'd say PCIe x1... in terms of preformance
8 0
3 years ago
Read 2 more answers
Which computer can perform the single dedicated task? a. Which commuter can perform the function of both analog and digital devi
vredina [299]
<h3>a= hybrid computer can perform the function of both analog and digital computer</h3>
8 0
3 years ago
Other questions:
  • A ____ is text and graphics that print at the bottom of every page.
    12·1 answer
  • TRUE OR FALSE: Individuals involved in surveillance prior to a terrorist attack are always well-trained and equipped.
    13·1 answer
  • What is the decimal equivalent of the binary number 1102?
    8·2 answers
  • What command launches the remote desktop client for windows?
    12·1 answer
  • Your instructor has asked you to perform some research regarding a computer OS capability of distinguishing spoken words. What i
    14·1 answer
  • Write a MARIE program to calculate some basic statistics on a list of positive numbers. The program will ask users to input the
    6·1 answer
  • Which word goes with "meals
    5·2 answers
  • Select all that apply.
    10·1 answer
  • A mom is planning a theme park trip for her husband, herself, and their three children. The family has a budget of $500. Adult t
    6·1 answer
  • What do you expect the future trends of an operating system in terms of, cost, size, multitasking, portability, simplicity
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!