1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MissTica
3 years ago
9

A monitor is a type of? CPU input memory output

Computers and Technology
1 answer:
aleksklad [387]3 years ago
5 0

Answer:

Un monitor es un periférico de salida en el que la computadora muestra las acciones y ejecuciones que se realizan él.

Explanation:

:D

You might be interested in
Travis sends Suri what purports to be a link to an e-birthday card, but when she clicks on the link, software is downloaded to h
12345 [234]

Answer:

Identity Theft

Explanation:

Identity theft is the act of someone who obtains details about someone else illegally.  This is done to find personal and financial information such  name, address,social security number, passwords, and credit card number, phone number, e-mail, etc. Then the hacker can use this information to control bank accounts, e-mails, computers, portray himself as you are, or sell information to someone else.

3 0
3 years ago
Consider the following code segment, which is intended to set the Boolean variable inRange to true if the integer value num is g
Natasha_Volkova [10]

Answer:

Option d  num = 50, min = 50, max = 50

Explanation:

Given the code segment:

  1. boolean isBigger;
  2. boolean isSmaller;
  3. boolean inRange;
  4. if (num < max)
  5.        {
  6.            isSmaller = true;
  7.        }
  8.        else {
  9.            isSmaller = false;
  10.        }
  11.        if (num > min)
  12.        {
  13.            isBigger = true;
  14.        }
  15.        else {
  16.            isBigger = false;
  17.        }
  18.        if (isBigger == isSmaller) {
  19.            inRange = true;
  20.        } else {
  21.            inRange = false;
  22.        }

If we have num = 50, min = 50 , max = 50,  the condition num < max will be evaluated to false and therefore isSmaller is set to false.

The condition num > min will be evaluated to false as well and therefore isBigger is set to false.

Since isSmaller and isBigger are both false and therefore isBigger == isSmaller will be evaluated to true and set the inRange = true. This has violated the statement that if the integer value num is greater than min value and less than max value, then only set inRange to true. This is because num = 50 is neither greater than min nor less than max, it is supposedly not in range according to the original intention of the code design.

8 0
3 years ago
Thomas is getting ready for a presentation. His slides are set, and he's
Harrizon [31]
I think the answer is B because all of the other ones dont make sense and wouldnt work in a time crunch
5 0
4 years ago
Read 2 more answers
Edhesive coding practice 3.4​
allsm [11]

I'm sorry i have to go to sleep.. Can we continue tm?

In the morning

8 0
4 years ago
Read 2 more answers
How can you encrypt and decrypt a message in cryptography
ser-zykov [4K]
There are two main types of encryption - <span>symmetric and asymmetric. 

Using symmetric encryption, you use a single secret key that is used to both encrypt and decrypt the data. This form of encryption has been used way before computers! Without this key it is very hard to decrypt a message. However, the issue with this is that if you want to send an encrypted message, you also have to send a key to them, and </span>if your somebody unintended intercepts the key, they can read the message.

What's the solution? Asymmetric cryptography or public key encryption. Asymmetric cryptography uses encryption that splits the key into two smaller keys. One of the keys is public and one is kept private. A good metaphor for understanding this is the public key is the lock, and the private key is the key. You can encrypt a message to send to somebody with their public key, locking it, which they can then decrypt, unlock, with their private key. And vice versa. So with this kind of encryption it's very difficult to decrypt a message for anybody but the owner as it's much harder to steal when it doesn't need to leave their computer, but easy to encrypt messages to send to them

5 0
3 years ago
Other questions:
  • In dt.py, you will implement a basic decision tree classifier for
    5·1 answer
  • Write a script that will generate random integers in the range from
    10·1 answer
  • Quote one of morrie's aphorisms and explain what you think it means (page 18).
    14·1 answer
  • Suppose that a client performs an intermixed sequence of (queue) enqueue and dequeue operations. The enqueue operations put the
    5·1 answer
  • 58:30
    8·1 answer
  • Write the name of the tab, the command group, and the icon that you need to use to justify
    14·1 answer
  • 2. How do cell phone users stay connected to the network as users move between cells?
    10·1 answer
  • Define computer ?what is water pollution?<br><br><br>​
    15·1 answer
  • Your data warehousing project group is debating whether to create a prototype of a data warehouse before its implementation. The
    12·1 answer
  • Which objects appear on the slide after she clicks ok? Check all that apply.
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!