1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Keith_Richards [23]
3 years ago
8

which of the following peripheral does not belong to a group: A) Monitor B) Printer C) Hardware D) Keyboard​

Computers and Technology
1 answer:
nikdorinn [45]3 years ago
5 0
C hardware is the correct answer
You might be interested in
6. By default,how the table headings are placed. (2 Points)
Dmitrij [34]
They are all bold and what ever else
6 0
3 years ago
Does group policy management matter without a server environment?
eimsori [14]

Answer:

The group policy management is one of the policy which used in the microsoft window that basically control the server working environment in the organization. It mainly control the user account and the personal computer account.

The group policy is the centralized management and the provide the various configuration of the operating system. It also manage and control the users setting in the active directory of the management.

Therefore, the group policy management matter in the server environment.

4 0
4 years ago
Before guis became popular, the _______________ interface was the most commonly used.
sineoko [7]
<span>Before GUIs became popular, the command line interface (CLI) was the most commonly used.
</span>GUI stands for Graphical User Interface . Like its name says it is a graphical interface <span>that allows interaction with users through graphical icons and visual indicators , rather than through text-based interface.</span><span>
Command line interace (CLI) is text-based interface in which </span>the user <span>issues commands to the program in the form of successive lines of text.</span>
6 0
3 years ago
If ClassC is derived from ClassB which is derived from ClassA, this would be an example of ________.
finlep [7]

Answer:

Inheritance

Explanation:

8 0
3 years ago
A common attack in which a client's cookies, security tokens, or other personal information is obtained and used to impersonate
o-na [289]

Answer:

Identity Theft. i hope this helps :D

5 0
3 years ago
Other questions:
  • HELPPP ASAPP
    8·2 answers
  • list the sixth external parts of a computer system and identify which are output and which are input devices
    14·2 answers
  • A client contacted you to request your help in researching and supplying the hardware necessary to implement a SOHO solution at
    5·1 answer
  • What is the quickest way to change the format of a table?
    8·1 answer
  • Identify whether each of the following goals would be a short-term or long-term goal for a high school senior who will graduate
    12·2 answers
  • Write an algorithm using pseudocode to input numbers . reject any numbers that are negative and count how many numbers are posit
    10·1 answer
  • Which of the following is true about media production? A. All media elements contain a certain type of editorial viewpoint. B. P
    10·1 answer
  • What’s GIGO<br> Please write it in full form
    15·1 answer
  • Does technology always follow the science,yes or no explain why to choice
    13·1 answer
  • PLEASE HELP!! THIS IS DUE SOON.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!