1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
baherus [9]
3 years ago
14

Which peripheral device is used to record sound?

Computers and Technology
2 answers:
faust18 [17]3 years ago
8 0

he will need a microphone, it is a recording device.

Digiron [165]3 years ago
5 0

The peripheral device used to record sound is a microphone or mic. In order to record a music rehearsal, Shane will need a microphone. It is an audio recording or audio transmission device.

<u> Explanation: </u>

A microphone is a peripheral device used to deal with sound recording and sound transmission. It is an essential device in today's world.  

It is used in mobile phones as well to facilitate sound transmission while on a call and recording as well.

You might be interested in
You are a very small company that sells healthcare insurance plans. You estimate that the breach of your customer database will
lozanna [386]

Answer:

C. Accept the risk

Explanation:

The first option is close but might not be suitable for a small company considering it's cost.

The second option which is to spend fifty thousand dollars per year on a data loss prevention solution is projected to cost you more than the risk.

The third option isn't specific and lacks a course of action.

6 0
3 years ago
Which best describes the benefits of renting a home
ANTONII [103]
Is it multiple choice or an essay question? If its an essay question I would say Living alone, being able to rent YOU'RE own home, and probably being able to decorate it the way you want. 
5 0
3 years ago
Read 2 more answers
Are sql injections legal?
natima [27]

Essentially, if you are seen to be someone who knows what you are doing, then even typing in a single-quote to a web form has been enough to be arrested and charged over in the past.

But lets say i'm writing a pen test tool that will be doing sqli testing and let it loose on sites that are 'out in the wild'. I'm not going to be doing dumps of any information. But is just the vulnerability scan itself illegal?



8 0
3 years ago
A personal computer uses a number of chips mounted on a circuit board called
Vesnalui [34]
The answer is d.mother board 

7 0
3 years ago
Character literals are enclosed in ________; string literals are enclosed in ________. Group of answer choices double quotes; do
adelina 88 [10]

Answer:

Single quotes; Double quotes

Explanation:

Character literals is a type of literal in Java programming used for denoting constant valued character. Examples are 'g', '6', 'A' '+' etc.

String literals is a type of literal in Java programming used for representing or displaying of a sequence of characters or string values. Examples are "Hello Brainly user"

In Java programming, Character literals are enclosed in single quotes, string literals are enclosed in double quotes.

7 0
3 years ago
Other questions:
  • What type of program would use to create a personal budget?
    14·1 answer
  • What is the main storage device where the computer stores data?
    15·1 answer
  • The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities.
    15·1 answer
  • Olivia has developed a great presentation with a distinct purpose and excellent content. She delivered it in a workshop and got
    9·1 answer
  • The Joint Photographic Experts Group developed the ___________ graphic format.
    12·2 answers
  • When working in Excel Online, what is it called when you drag the fill handle down to copy data?
    10·2 answers
  • Choose the risks from the options below to presenting yourself differently online than offline?
    12·1 answer
  • All of the following are current key technology trends raising ethical issues except:_________
    13·1 answer
  • What is SoC? how is it different from CPU?
    14·1 answer
  • Janice has decided that the best approach to programming a new social media app is to start with a small portion of it by writin
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!