1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kumpel [21]
3 years ago
6

The components of hardware include:

Computers and Technology
2 answers:
ehidna [41]3 years ago
7 0

Answer:

B.monitor,cpu,disk drives,touch screen,keyboard/Mouse

zlopas [31]3 years ago
5 0

Answer:

A

Explanation:

Monitor, CPU, Disk Drives, Printer, Keyboard/mouse

You might be interested in
Five aplications of ict​
Irina18 [472]

Answer:

MS Word, MS Excel, MS PowerPoint, Adobe Photoshop, Adobe Reader

Explanation:

8 0
3 years ago
Is Brainly cheating??
Vanyuwa [196]

Answer: What do you mean?

6 0
3 years ago
Read 2 more answers
PLEASE HELP!! Which of the following computing devices would best address the needs for a CYBER SECURITY ANALYST?
Tomtit [17]

Answer:high end laptop.

Explanation:

5 0
4 years ago
Please explain in simple words. What does a root do to your tablet? And how do you do it? Is it worth doing it if you only play
nadya68 [22]
Root is a term for android devices similar to "jailbreak" for Apple devices. Rooting gives you basically full control of your device but is considered to be a third party software because you are modifying the operating system. I would watch a YouTube video on how to root your device. I tried to root my device so I could get this screen recording app to work. I think it is really up to you because I think it avoids warranty.
6 0
3 years ago
A serial schedule:
Lina20 [59]

Answer:

B)

Explanation:

Is alwayd sorted sequentially in aceding order by transaction ID

6 0
3 years ago
Other questions:
  • The time between requests to a web server is exponentially distributed with mean 0.5 seconds. NOTE: This is a multi-part questio
    8·2 answers
  • Which program has an indexed version of the NIST NSRL of MD5 hashes that can be imported to enhance searching for and eliminatin
    10·1 answer
  • What is diffie-hellman most commonly used for?
    15·1 answer
  • Rather than simply repeating key terms and concepts, Jeremy focused on the meaning of the information in the chapter and tried t
    13·1 answer
  • An attacker is intent on disturbing the communication by inserting bogus packets into the communications.
    9·1 answer
  • What’s an input Device
    7·2 answers
  • Level Access Test - Please Ignore
    14·1 answer
  • ______ provide visual representations of the options available for a given command
    7·1 answer
  • Who developed the first personal computer called the altair
    15·1 answer
  • Need help with these plss correct answers
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!