1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Phantasy [73]
3 years ago
15

Drag each label to the correct location. Each label can be used more than once. Match the device to the port through which it co

nnects. Monitor External hard drive Flash drive Flash drive Mouse hdmi usb- c display port thumder port
Computers and Technology
1 answer:
son4ous [18]3 years ago
5 0

Answer:

Mouse - USB

Monitor - display port, HDMI, and thunderbolt port

External hard drive - USB and thunderbolt port

Flash drive - USB

Explanation:

A computer mouse is an input device used to interact with a computer system. It connects with the computer through the USB port.

A Monitor is an output device that is used to display information on a computer system. It can be connected to the system through the display ports, HDMI, and the thunder port.

The External hard drive is a storage device that holds data for a long period of time. It has adapters to connect to the computer through the USB ports or thunderbolt ports. The flash drive is similar in function to the hard drive but small in size and storage space. It only connects with the computer through USB ports.

You might be interested in
A security administrator is analyzing a user report in which the computer exhibits odd network-related outages. The administrato
elena-s [515]

Answer: Session Hijacking

Explanation:Session hijacking is the attacking activity that threats the valid session of the computer. This attack also invokes the system with unauthorized access for hacking the information and other processes.

Other options are incorrect because crpto-malware is the ransomware that demands ransom for data encrypted by the hackers, rootkit  permits the authorized access in system without getting noticed and logic bomb is a malicious code to harm the program computing. Thus, the correct option is session hijacking.

8 0
3 years ago
What is a path and how do you know that it is filled and selected
Shkiper50 [21]

Explanation:

A path represents a selected editing area of an image, this feature is typically available when using Adobe Photoshop software.

For example, a photographer may select the entire face area of his subject as his path (work path). To know when it is filled the photographer observes to see when the colour changes or other changes are applied to the background layer of the selected path.

8 0
3 years ago
Which represents the hierarchical structure of a Google Analytics account from top to bottom?
zlopas [31]

Answer: (D) Account > Property > View

Explanation:

 The Account > Property > View is the hierarchical structure of the google analytics account and it this hierarchical stricture basically represent from top to the bottom. The google account basically contain two and more properties for structuring the efficient accounts.

The property of the reporting view contain unique ID and it is the combination of digits and account ID. The view property in the analytic account basically used for access, analyzing and customize the data for viewing in proper way.

8 0
3 years ago
What is RAM? explain it
Zina [86]
RAM is memory in the computer
3 0
3 years ago
Read 2 more answers
1. Mark the following statements as true or false. A. Division by zero is an exception while opening an input file that does not
Lilit [14]

A. Division by zero is an exception while opening an input file that does not exist is not an exception.

False. The given except is not related to file operation

B. Suppose you use the assert function to check if certain conditions are met. If the conditions are not met, then the assert function terminates the program.  

True. Yes, it terminates by giving error message

C. One way to handle an exception is to print an error message and exit the program.  

True. Yes, it is one of the safe way to handle exception and stop the program smoothly

D. All exceptions need to be reported to avoid compilation errors.

False. Exceptions are related to run time.

E. Every try block must have a catch block.  

True. A “try block” needs to have catch block but “finally” is optional. There can be more than one catch block for a single “try block”.

F. The order in which catch blocks are listed is not important.

False. It is important to have a good programming skill. If you place the  “Exception class” which is the base for all the other types of exception in the top of catch list then, no other specific exception will get caught which is a very bad programming.

G. If an exception is thrown in a try block, the remaining statements in that try block are executed after executing a catch block.  

False. “Try block” will not get executed.

H. In C , an exception is a value.

True  

I. The class invalid range deals with the string subscript out of range error.

True.

J. In C , any class can be considered an exception class.  

False

K. The exception class must contain at least one member.  

ans: True

L. An exception can be caught either in the function where it occurred, or in any of the functions  

that led to the invocation of the method.  

True. But it is always better to catch exception in the same function.

M. When the function call stack is unwound, the function in which the exception was not caught terminates, but the memory for its local variables remains allocated.

True

7 0
4 years ago
Other questions:
  • A ________ is a system of hardware and software that stores user data in many different geographical locations and makes that da
    14·1 answer
  • ________ is the gathering, organizing, sharing, and analyzing of the data and information to which a business has access.
    6·1 answer
  • The merge process involves which two types of files?
    9·2 answers
  • OSHA requirements state that employees must have eye or face protection if their work exposes them to hazards such as:
    8·1 answer
  • Give three reasons why Black hats hack?
    8·2 answers
  • What is the navigation aid that shows users the path they have taken to get to a web page located within a website?
    12·1 answer
  • In the following code, use a lock to protect any data that might need protecting. Keep your critical sections as small as possib
    8·1 answer
  • given:an int variable k,an int array currentMembers that has been declared and initialized,an int variable memberID that has bee
    5·1 answer
  • Help help help help​
    6·1 answer
  • A compound Boolean expression created with the _________ operator is true if either of its subexpressions is true.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!