1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MissTica
3 years ago
9

A monitor is a type of? CPU input memory output

Computers and Technology
1 answer:
aleksklad [387]3 years ago
5 0

Answer:

Un monitor es un periférico de salida en el que la computadora muestra las acciones y ejecuciones que se realizan él.

Explanation:

:D

You might be interested in
Rob creates a Course_Details table that has four columns: Course _ID, Course_Name, Semester and Credits. A course may have 0.5 c
Digiron [165]
As a<span> </span>primary key<span> is a field in a table which uniquely identifies each row/record in a database table, then the advisable field for the primary key in here should be the Course_ID. That is very unique in that table</span>
7 0
3 years ago
Read 2 more answers
Which two extensions in scratch are correctly matched to their accessibility goals
enyata [817]

The two extensions in scratch are correctly matched to their accessibility goals Translate extension and  Text to speech extension.

<h3>What are Scratch Extensions?</h3>

Scratch extensions are known to be used in an interface with external hardware and information outside of the Scratch website via new blocks.

Note that The two extensions in scratch are correctly matched to their accessibility goals Translate extension and  Text to speech extension.

Learn more about scratch  from

brainly.com/question/25720264

#SPJ1

4 0
2 years ago
The process of encoding messages or information in such a way that only authorized parties can read it is called ____________.
lukranit [14]

Answer:

Encryption

Explanation:

Encryption is a term in the field of computer security (Cryptology) this is a process of encoding information in a way that hackers and eavesdroppers cannot read. The process of encryption involves a plain text (message) been converted into a scrambled text (cipher text) with an encryption algorithm (key) in this way, if the message is intercepted by a hacker he/she is unable to read the contents. Only the authorized party with a decryption key will be able to decrypt back to a plain text and read the contents of the message

3 0
3 years ago
Select all the sets that are countably infinite. Question 3 options: the set of real numbers between 0.1 and 0.2 the set of all
timama [110]

Answer:

1.  the set of real numbers between 0.1 and 0.2

2. the set of all negative integers greater than negative 1 trillion

3.  the set of all java and C programs

Explanation:

A set is countable if it is either finite or has the same cardinality as the set of positive integers. The inverse of this set type is uncountable.

The set of real numbers between 0.1 and 0.2, all negative integers greater than negative 1 billion, and a set of java and C programs are all countable sets, so are considered countably infinite.

5 0
3 years ago
How does a spreadsheet affect a column of numerals when it sorts the column
maria [59]

Explanation/Answer:

Data can be put into more than one cell (Excel), which should be an important key to your answer. In SEVERAL CELLS AT THE SAME TIME or more. The data can be entered in dates, text, times, or numbers. Formatting the data can be done in a possibility of ways.

6 0
3 years ago
Read 2 more answers
Other questions:
  • Are we too dependent on technology if yes then can you please explain?
    12·2 answers
  • If your vehicle catches fire while you are driving, you should:
    5·2 answers
  • Which audio editing effect uses the option ""Get Profile"" to execute its function?
    6·1 answer
  • Help!!!!!!!!!!!!!!!!!!!
    12·1 answer
  • Which of the following combines something you know, such as a password, with something you are (a biometric device such as a fin
    13·1 answer
  • Around what time did the Internet come around and how did it all start? Would like to know more of the history of how the intern
    12·1 answer
  • Which of these is an example of collective voice?
    8·2 answers
  • Research and build a chroot jail that isolates ssh users who belong to the restrictssh group. (You will also need to create the
    9·1 answer
  • Adam has designed and tested an Android app for a startup. The client expects to get quick responses to the app. After consultin
    7·1 answer
  • Which of the following is true about stateless applications?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!