1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pishuonlain [190]
3 years ago
10

List the six external parts or "peripherals" of a computer system and identify which are output and which are input devices/ Lis

t the seven basic internal components found in a computer tower.
Computers and Technology
1 answer:
vitfil [10]3 years ago
3 0
Keyboard-Input
Mouse-Input
<u></u>Monitor-Output
Speakers-Output
Printer-Output
Hard Drive<span>-Output</span>
You might be interested in
Suppose an IP packet is fragmented into 10 fragments, each with a 1% (independent) probability of loss. To a reasonable approxim
Marysya12 [62]

Answer:

a. 0.01

b. 0.001

c. The identification field of the packet fragment can be used to uniquely identify and collate the fragments lost in transmission.

Explanation:

The probability of losing a packet is 10% or 0.1, so the probability of losing the packet twice during transmission;

= 0.1 x 0.1 = 0.01

When any fragments have been part of the transmission, the probability of the packet is dependent on the fragments;

= 0.01 x 0.1 = 0.001

The identification field is a unique 16-bit value assigned to an IPv4 packet, when a packet is fragmented for transmission, its field is used to collate the unique fragments in the packet.

6 0
3 years ago
By using password-stealing software, ________ capture what is typed on a keyboard and easily obtain enough personal information.
wariber [46]

Answer:

B) Keyloggers

Explanation:

Keyloggers are malicious softwares used by hackers to secretly record and capture keystrokes on a person's computer when they are using it. This enables the hackers steal sensitive data like passwords, bank details, address etc. Keyloggers are one of the oldest forms of cyber threats used by cybercriminals to spy on unsuspecting users. Keyloggers can be sent through links to access. computer o directly installed with access to the computer.

5 0
3 years ago
Alice's Restaurant Supply offers a line of specialty food products to institutional
Illusion [34]

Answer:

1) the wireless standards that can be implemented are; IEEE 802.11a, IEEE 802.11b, IEEE 802.11g and IEEE 802.11n. The pros and cons are in the attachment

2) 802.11g can be implemented in alice's restaurant. This is because it provides the fastest speed and has a wide range which will not be easily disturbed by other devices

3) Please check the attachment

4) Please check the attachment.

Explanation:

3 0
3 years ago
How to turn off life360 without parents knowing on iphone
taurus [48]

Answer: Launch AnyGo. Once you download the AnyGo latest version, you can double click on the setup and install it on your PC.

Connect iPhone to the PC. Now take your iPhone and connect to the PC that you installed, AnyGo. ...

Check the current location. ...

Find the destination. ...

Teleport to the location. ...

6 0
2 years ago
____ are types of changes that occur when text has been omitted from a document and must be inserted later.
VMariaS [17]
You already wrote the answer. It is Additions
7 0
3 years ago
Other questions:
  • How do I learn coding??? ​
    5·2 answers
  • A bookmarking site is a website that enables members to manage and share media such as photos, videos, and music. true or false
    14·1 answer
  • If you wanted to search for emails containing the word advanced and prevent emails containing the word new from appearing in the
    14·1 answer
  • How many slides should a presentation include?
    11·2 answers
  • What is a series of instructions or commands that a computer follows used to create software
    9·1 answer
  • Write a method for the Customer class that that will return a string representing a bill notice when passed a double value repre
    14·1 answer
  • In ____, two or more disk drives become one large volume, so the computer views the disks as a single disk.
    13·1 answer
  • To open a Google Doc in another software application, the user must first download it. True or false?
    12·2 answers
  • You wrote a program to find the factorial of a number. In mathematics, the factorial operation is used for positive integers and
    14·2 answers
  • How do I add a Child to my Brainly account
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!