1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tensa zangetsu [6.8K]
3 years ago
6

Please help Ill give you brainliest if I get 2 answers. Which is used to input information on a laptop?

Computers and Technology
1 answer:
Ivanshal [37]3 years ago
7 0

Answer:

c

Explanation:

You might be interested in
1. Encrypt this binary string into cipher text: 110000. Include in your answer the formula the
puteri [66]

Answer:

Encrypt this binary string into ciphertext: 110000. Include

in your answer the formula the decoder would use to decrypt your cipher text in the format (coded answer) x N mod (m) = Y

-Decrypt this ciphertext into a binary string: 106

Now that you can see how public and private keys work in a real-world scenario, please explains how it works for computers and internet communications in relation to cybersecurity.

Explanation: ……………..

6 0
3 years ago
Discuss FOUR challenges that have an impact on domestic tourism
shutvik [7]
Crime rate
unemployment
fluctuations
suspension of terrorism
5 0
4 years ago
A local firewall adds protection to a hardware firewall by protecting a device _______. Select all that apply. WILL GIVE BRAINLI
Dmitry_Shevchenko [17]
Answer is c. have a good day
6 0
3 years ago
Read 2 more answers
Tricia listed her assets and liabilities. Credit Card Bill Car Loan Bonds Piano Bank Account Bicycle Which are Tricia’s liabilit
DIA [1.3K]
<span>Her liabilities are her credit card bill and her car loan. These are things that she owes and has to pay off, so they are liabilities due to the fact that she owes for these items. Her bonds, piano, bank account, and bicycle are counted as assets.</span>
7 0
3 years ago
Read 2 more answers
What is the output of the following code? public class Test { public static void main(String[] args) { new Person().printPerson(
fredd [130]

Answer:

The output of the given question is :

Person

Person

Explanation:

Following are the description of Statements

  • The new Person().printPerson(); calling the function of printPerson() of the class Person so it returns the Person in the console window.
  • The new Student().printPerson(); calling the function of printPerson() of the class student .The student inherits the class Person So control will moves to the class it executed the statement inside the Person class So it executed the function public void printPerson() of the Person class so it also returns the Person String and execution of program become stops
3 0
3 years ago
Other questions:
  • What is the purpose of news services
    13·1 answer
  • Which is NOT a way the network operating sys-
    6·1 answer
  • BITS wants to store information about the supervisors, including their supervisor number and the relationship to consultants. Su
    15·1 answer
  • Are there any tips or helpful advice for people who want to learn Photoshop?
    10·1 answer
  • Social scientists who study criminal behavior.
    7·2 answers
  • When activated, an Excel object has all the features of an Excel
    8·2 answers
  • Which of the following types does the Java programming language support?
    9·2 answers
  • What symbol is used for an assignment statement in a flowchart?
    8·1 answer
  • Visit on social networking site and look for the site's privacy policy.The link is typically found at the bottom of the page and
    9·1 answer
  • If the middle number is lesser than the candidates then u eliminate the ___ half of the data​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!