1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fynjy0 [20]
3 years ago
14

Jenis jenis perangkat keras?

Computers and Technology
1 answer:
Oksanka [162]3 years ago
3 0
Input, output, dan prosess
You might be interested in
What is the name of the "local user" account involved in the alleged actions (Hint: where in the file structure did you find the
Sunny_sXe [5.5K]

I will assume this is a windows computer

Answer:

  • Disk (Letter)\Users\<"Answer">\Folder\Documents\SuspiciousFile.exe
  • You can use Windows Security Logs to try and find out from what IP address the user you just found logged in from.

Explanation:

The windows user folder has folders that contain each users data, Using the file path of the suspicious file you can figure out which user is associated with the file.

Windows Security Logs collect data on logon attempts so when the user logs in their IP address should be collected in these log files.

8 0
3 years ago
When should you integrate technology?​
earnstyle [38]
Nolur acil lütfen yalvarırım yalvarırım lütfen yalvarırım when should you integrate technology?
5 0
3 years ago
Read 2 more answers
Your company has decided to replace several hundred hard drives. It would like to donate the old hard drives to a local school s
Tanzania [10]

Answer:

Drive Wipe F is correct

Explanation:

Drives content is virtual so it wouldn't work to shred or incinerate it. overwriting it wouldn't work to get rid of files exactly. it might get rid of the files but it would replace the files with other files.

3 0
3 years ago
Which of the following helps create a positive community?
natita [175]

Answer:

Less Violence?

6 0
4 years ago
What is generation of computer? List the generation of computer with devices used.
OLEGan [10]

Answer:

1) 1st Gen : ENIAC

2nd Gen : IBM 7030

3rd Gen : IBM 360 / 370

4th Gen : Apple

5th Gen : Sun Workstation

2) Features of 2nd Gen computers

• Small in size

• Less heat generation

• Low power consumption

• Comparatively faster than the first generation

3) Quality , Storage of Text , Time Saving , Security

4) • Analog computer has no state.

• Digital computer has On and Off these 2 steps.

5) • Large in size

• Higher computing power

• Expensive

• Rare

3 0
3 years ago
Other questions:
  • To protect your answers after completing an assignment, what should you do? close your browser window. let someone else start wo
    14·1 answer
  • A proactive computer professional will _____. have a neutral outlook toward technology underestimate the impact of technology an
    13·2 answers
  • A(n) __________ can include a computer's full operating system, applications, and system settings, including security and config
    7·1 answer
  • How are natural systems and engineered systems similar to one another?
    8·1 answer
  • Information has just been sent from a Web form on a client's system to a Web server. Which of the following is required to proce
    14·1 answer
  • How can you ensure that the website you are using is secured?
    8·1 answer
  • You started writing a paper yesterday. You worked on it again today. After a few hours, you realized that you have introduced so
    15·2 answers
  • Which of the following enables robots to do things such as understand itself, walk, talk, and develop skills?
    15·1 answer
  • What is one advantage of storing numeric data in variables?
    10·1 answer
  • Which data type does not allow duplicate values-python
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!