1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alekssandra [29.7K]
3 years ago
8

What are the 6 external parts of a computer system

Computers and Technology
1 answer:
denis23 [38]3 years ago
4 0
1. Monitor
2.C.P.U
3.Mouse
4. Keyboard
5. Printer
6. Speaker
You might be interested in
Which of the following is used to move to end of the row?​
Ksenya-84 [330]

Answer:

no

Explanation:

no no np np np no no no no mo no on no non onononononoononon

4 0
3 years ago
A type TW cable containing two No. 12 copper conductors has a maximum overcurrent protection of
Arisa [49]
I think it is 25 im not sure though
3 0
3 years ago
Read 2 more answers
select all examples of proper keyboarding technique. rest your fingers gently on the home row or home keys. slouch in your chair
padilas [110]

Rest your fingers gently on the home row or home keys.

Rest your palms on the keyboard.

Relax your fingers.

All the above are proper keyboard techniques apart from slouch in your chair. It is always recommended to sit up straight with your feet positioned on the floor for balance. Do not cross. Center your body to the H key and have your elbows at sides and bent about 90 degrees. Use correct fingering and deploy touch typing. These and many others will help develop optimal speed and accuracy and help prevent the development of stress injury.

6 0
2 years ago
Read 2 more answers
Q Basic program write a program in Q Basic to find the cost of 10 pens when the cost of 15 pens is 75 use unitary method to find
Ne4ueva [31]

give the function of cpu

5 0
2 years ago
Which symbol would be used in a flowchart to represent a connection to another part of the flowchart
Lisa [10]
The answer is an arrow
3 0
3 years ago
Other questions:
  • What is the protocol in the web search at the bottom?
    13·1 answer
  • Access Control can be defined as putting controls (or countermeasures) in place to help achieve information security goals. Whic
    13·2 answers
  • Which term is used to describe a password-protected, encrypted data file that verifies the identity of the sender of a message?
    8·1 answer
  • A collection of facts can be copyrighted, but only if the collection is ____ in a way that causes the resulting work to rise to
    14·1 answer
  • In Word, a red wavy underline indicates a/an
    15·1 answer
  • What type of device does a computer turn to first when attempting to make contact with a host with a known IP address on another
    9·2 answers
  • What does Putting a word in quotation marks on your search bar do on google?
    12·1 answer
  • My friend has 200 subs and i have only 36 can you help me its ACYT ZR
    9·2 answers
  • How do you customize calendar view​
    9·2 answers
  • DRAW A FLOWCHART THAT WILL ASK THE USER TO ENTER AND DISPLAY THEIR PERSONAL DETAILS SUCH AS NAME AND AGE.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!