1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oksian1 [2.3K]
3 years ago
12

What are the external parts of a computer system? Which are input and output?

Computers and Technology
2 answers:
Helen [10]3 years ago
5 0
1. Since I have an iMac late 2013, I can tell you what is on a mac. There is a Headphone port, a Microphone port, a Firewire port (WORST PORT EVER), the 3 USB ports (The Most Useful), the Ethernet port (If you are close to an Internet box you can plug in; somewhat useful!).

2. The input is when you plug something in that provides something for the computer (headphone, microphone, USB etc). The output is when the computer provides something for you (sound, files, websites etc).

Your welcome!
____ [38]3 years ago
4 0
Input for example is a mouse, keyboard, microphone while an output is a monitor, headset/speakers.
an input sends data into the computer while an output sends it out again,
hope this helps
You might be interested in
You are designing a VPC for a small application. It will operate in a private subnet and needs internet access to software updat
lilavasa [31]

Answer:

Refer below.

Explanation:

VPC, Subnets, Route Table(s), Nat Gateway, and Internet Gateway. These are the least required services to provide internet access to a private EC2 instance. NAT gateway requires an internet gateway.

3 0
4 years ago
Shelly recorded an audio composition for her presentation. Arrange the following steps that Shelly followed in the proper order.
Dimas [21]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

Shelly recorded an audio composition for her presentation. She needs to follow the following proper orders to get composition done for her presentation.

  1. She connected her microphone to her computer.
  2. She selected the record option in her DAW.
  3. She added effects to her audio composition.
  4. She saved the audio composition in an appropriate file format.
  5. She saved her audio composition on an optical drive.
3 0
3 years ago
Sample answers of What assets were targeted Stuxnet and the team behind the worm?
Damm [24]
The assets were programmable logic controllers (PLCs).  Which controlled systems like prison doors and centrifuges for separating nuclear material. 

The "who" is still debated.  Credit (if you use that word) is given to the Equation Group.  But that is still hotly debated as there seems to be a political agenda with the attack and many still believe this was nation-state sponsored.  I can be easy to leave digital fingerprints behind to make it seem like a known hacking team.
8 0
4 years ago
LITERALLY PLS ANYONE!!! 90 pointsss!
Doss [256]

7. Intentional Virus Setting is when you the user purposely spread computer viruses in order to do harm. It should be noted that this is highly illegal (no duh) with a sentence of up to 10 years and $250,000 in penalties assuming you are convicted under the Computer Fraud and Abuse Act of 1986 here in the States.

8. intrusion of solitude, appropriation of name or likeness, public disclosure of private facts, and false light.

9.  Intentionally creating and/or sending a virus and infecting people's computers is against the law, and can result in jail time or a fine.

10. Some examples are: Deception - Lying about how information will be used. Violation of confidentiality - Disclosing someone's personal information without consent. Intrusion - Interference in an employee's personal life. Misappropriation - Using a person's likeness to promote a product without his consent.

11. Everyone wants PRIVACY for themselves, and everyone wants ACCOUNTABILITY from others. Privacy is a basic human need, and invasion of privacy can have serious psychological and emotional consequences, including paranoia, anxiety, depression and broken trust. Invasion of privacy is both a legal and an ethical issue.

12. A cause of action for invasion of privacy entitles the plaintiff to recover damages for the harm to the particular element of his or her privacy that is invaded. Thus, one who suffers an intrusion upon his or her solitude or seclusion, may recover damages for the deprivation of his or her seclusion.

13. An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet. Many businesses and educational facilities require that employees or students sign an acceptable use policy before being granted a network ID.

14. Intellectual property refers to creations of the mind: inventions; literary and artistic works; and symbols, names and images used in commerce. Intellectual property is divided into two categories: Industrial Property includes patents for inventions, trademarks, industrial designs and geographical indications.

PLEASE PLEASE PLEASE HELP WITH MY RECENT!!!!!!

btw hope this helps if it does please make brainliest :)

6 0
3 years ago
Read 2 more answers
What best describes the kinds of online items that are usually protected by copyright law?
Sergeu [11.5K]

technically, anything that is copyright protected. but the answer that best describes the kinds of online items that are usually protected by copyright law?  the answer is D. Most media work that is available for money


Hope this helps!

-SchoolIsBlaaa

7 0
3 years ago
Other questions:
  • What is a multipurpose network device?
    12·1 answer
  • How do you activate caps lock on chromebook
    10·2 answers
  • It is important to create an IT security program structure that aligns with program and organizational goals and describes the o
    6·1 answer
  • What is Deep learning
    9·1 answer
  • If you embed a Word table into PowerPoint, what happens when you make edits to the embedded data? A. Edits made to embedded data
    12·1 answer
  • How can I make a video game?
    8·2 answers
  • 2. Why don't all buses on a motherboard operate at the same speed?​
    6·1 answer
  • When Google created its China-based search engine www..cn, they did not foresee eventually abandoning it because of censorship i
    12·1 answer
  • Given two integers as user inputs that represent the number of drinks to buy and the number of bottles to restock, create a Vend
    10·1 answer
  • 1.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!