1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erma4kov [3.2K]
3 years ago
7

To connect a peripheral device to a computer to exchange data, find the appropriate ________ for the device.

Computers and Technology
1 answer:
Inessa05 [86]3 years ago
4 0

Answer:

<em>Port</em>

Explanation:

A<em> device port or peripheral port is a hole or connection found on a computer's  front or back when referring to a physical device.</em>  

Ports enable external devices such as printers to access computers.

It is a computer tool that can be connected to peripherals such as input and output devices.

You might be interested in
Getting access to web browsing software to install it on a computer or to update your existing software is called _________ .
Ivenika [448]

Answer:

Downloading and/or Burning it on to your computer

Hope this helped! if so please mark it as brainliest

Explanation:

8 0
3 years ago
Read 2 more answers
Do all light bulbs server a practical purpose?
Greeley [361]

Answer:

A light bulb produces light from electricity

6 0
3 years ago
An administrative assistant types a document, saves, and prints. The assistant is using _____.
9966 [12]
The answer to your question is software. 
3 0
3 years ago
What is the CPI of the central processing unit cpu of a computer
vlada-n [284]
Electronic component on a computer's
motherboard that interprets and carries
out the basic instructions that operate
the computer; also called processor.
5 0
3 years ago
What is a trojan horse in computer science?
Firdavs [7]

Answer:

type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems.

Explanation its malware

4 0
3 years ago
Other questions:
  • Why dose this keep popping up will give brainlest for first person answer
    12·1 answer
  • The collodion process was significantly more expensive than the cost of a daguerreotype
    10·1 answer
  • What is FireWire?
    7·2 answers
  • This loop is a good choice when you know how many times you want the loop to iterate in advance of entering the loop.
    14·2 answers
  • Which of the following was the name of the first generation of cell phone networks?
    14·1 answer
  • Displays are geared for a specific resolution. what is this resolution called?
    15·1 answer
  • In chapter 3, we discussed syntax and semantics, in general there are two types of grammars for programming languages, regular a
    14·1 answer
  • A person you respect who offers you advice and assistance is known as a(n) _____.
    12·1 answer
  • Which of the following activities does an effective team do?
    15·2 answers
  • 2.13 LAB: Branches: Leap Year
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!