1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kaheart [24]
3 years ago
7

What type of device is the keyboard? Output Input Monitoring Software

Computers and Technology
2 answers:
n200080 [17]3 years ago
5 0

The answer is the second choice, "Input."


The keyboard is considered an input device since it interacts with and sends data to the computer. Some other input devices are the mouse, webcam, etc.

rewona [7]3 years ago
4 0
A keyboard is a main input device
You might be interested in
Python program: Develop a program that will keep track of inventory for a local retail store. Fortunately, the store only offers
EastWind [94]
333 Sweater 500 The better programs will only process data
7 0
3 years ago
Read 2 more answers
He should identify his various
joja [24]

Answer:

false, that shouldn't be a a priority to identify if they are or not.

Explanation:

3 0
3 years ago
An important principle in information security is the concept of layers of security, which is often referred to as layered secur
Eva8 [605]

Answer:

Available options in question are

  1. a firewall :  
  2. a server
  3. an application
  4. control standard

Answer is : Control Standard. It is not an example of layer of security.

Explanation:

Defense in depth consists of three major domains like physical, technical and administrative. Layered Security will consists of best practices by combining multiple  security methods to mitigate vulnerabilities and attack vectors. It is used to protect resources at different levels.  

  • A firewall is used as layered security measure to secure networks and systems.It is most commonly used security measure for enterprise products.
  • A server is typical example of physical control. In this  it protects actual IT servers, high-end servers, cloud servers and any physical hardware and assets.  
  • An Application can be used an example of Layer security. Applications like Antiviruses, Vulnerability Scanners, Anti Malware software and Web Application firewall gateways are typical examples

Control Standard is not an example of Layered Security.

5 0
3 years ago
Which model works on the idea that advertising motivates people to think about the message, feel something about the product, an
Ganezh [65]

Answer:

D. Think-Feel-Do Model

Explanation:

The Think-Feel-Do Model or simply just TFD model is a marketing model used by marketers to engage their target customers.

THINK - Involves the marketers having an insights into the target customer's needs that are important.

FEEL - Understanding the target customers basic drive. It involves inbound and outbound marketing communications.

DO - This involves the creation of marketing materials to be used in targeting the target customers for the products/services.

7 0
3 years ago
Create a method called fixArray(int[][] array, int row, int col, int value) that sets the [row][column] to the correct value. Th
PolarNik [594]

Answer:

  1. public class Main {
  2.    public static void main (String [] args) {
  3.        int[][] myArray = {{1,5,6}, {7, 9, 2}};
  4.        fixArray(myArray, 1, 2, 12);
  5.        System.out.println(myArray[1][2]);
  6.    }
  7.    private static void fixArray(int[][] array, int row, int col, int value){
  8.        array[row][col] = value;
  9.    }
  10. }

Explanation:

The solution code is written in Java.

Firstly, create the method fixArray with that takes four inputs, array, row, col and value (Line 11). Within the method body, use row and col as index to address a particular element from array and set the input value to it (Line 12).

Next, we test the method in the main program using a sample array (Line 4) and we try to change the row-1 and col-2 element from 2 to 12 (Line 5).

The print statement in Line 7 will display 12 in console.

7 0
3 years ago
Other questions:
  • Identify the correct XHTML syntax for inserting an image as a hyperlink from the options provided. A. book.gif B. C. D.
    9·1 answer
  • 5. Which of the following is a Windows feature that allows you to temporarily store text?
    13·2 answers
  • Another important mode, XTS-AES, has been standardized by the __________ Security in Storage Working Group. a. IEEE b. ITIL c. N
    9·2 answers
  • A company is utilizing servers, data storage, data backup, and software development platforms over an Internet connection.
    14·1 answer
  • Suppose that Alice wants to send Bob a 50 kilobyte message over a 1 Gbps link. The total time required to transmit the message (
    5·1 answer
  • Methods that require you to use an object to call them are called ____ methods.1. accessor
    7·1 answer
  • in java how do i Write a program that reads a set of integers, and then prints the sum of the even and odd integers.
    6·1 answer
  • What does t'challa actions reveal about his character( black panther movie)​
    6·1 answer
  • Why do we need to make a plan before actions?
    7·1 answer
  • Whats the flow in this code, and whats the risk that its creating and what can i do to fix it? (c language)
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!