1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dafna11 [192]
3 years ago
15

What are the trinity of the computer system

Computers and Technology
1 answer:
barxatty [35]3 years ago
6 0

Answer:

I think the answers are input, processes, output

You might be interested in
A fast way to add up a column of numbers is to click in the cell below the numbers and then: Click Subtotals on the Data menu. V
Art [367]

Answer:

Click the AutoSum button on the Standard toolbar, then press ENTER

Explanation:

Excel offers a range of options to perform various mathematical operations. When numeric values are being inputted into cells, either columns or rows, the AutoSum function which is located in the home Taskbar allows for a very fast addition of the total values in the column or rows. Once the cell after the last cell value is selected, the AutoSum function is selected and the ENTER button is pressed, this will use the sum function of excel to quickly provide the total sum of all the values in the column.

3 0
3 years ago
Read 2 more answers
write a function that given an integer n returns the smallest integer greater than n the sume of whose digits is twice as big th
USPshnik [31]

The code below is written in javascript which gives us the integer,

<h3>The function code is</h3>

function solution (num){


//Javascript function


var x=0,sum=0,a,b;


var d=""; //variable declaration


var digits = num.toString().split('');


var Individual = digits.map(Number);


//console.log(Individual);


for (var i=0;i<Individual.length;i++)


{//For loop


x=x+Individual[i];


}


var y=x*2;


for(var i=0;i<Individual.length;i++)


{


sum=sum+Individual[i];


d=""+d+Individual[i];


if(sum==y)


break;


if(i==Individual.length-1)


{


i=-1;


continue;


}


}


console.log("the value is "+d);


}


var number = prompt("enter the number");


//Asking user for value...


console.log("the number is");


console.log(number);


solution(num

For more information on javascript, visit

brainly.com/question/16698901?referrer=searchResults

3 0
2 years ago
In this lab, your task is to complete the following: Enable all of the necessary ports on each networking device that will allow
Sphinxa [80]

Answer:

enable the used ports in the router with their respective IP address and only the connected ports in the switch. Allow configure the STP on the switch

Explanation:

Network switches are used to connect a group of computer devices in a network LAN. It is automatically enabled when a port is connected and creates a MAC address table of the computers connected to it. STP or spanning-tree protocol is a protocol used to prevent looping in a switch. Unused ports can be disabled for security reasons.

A router is a network device that is used to forward packets between networks. All used ports in a router must be enabled and configured with an IP address and subnet mask.

5 0
3 years ago
Which of these is an example of a system?
lisov135 [29]

Answer:

force and a single particla of matter

4 0
3 years ago
An audit trail is a record of how a transaction was handled from input through processing and output
Nostrana [21]

The answer is : True.  An audit trail is a record of how a transaction was handled from input through processing and output.  An audit trail is the evidence, such as purchase orders and invoices, that a financial transaction actually occurred.

6 0
3 years ago
Other questions:
  • HELP PLEASE
    7·2 answers
  • Why is it a mistake to put e-mail address of people who don't know each other in the "to:" field
    9·2 answers
  • Moving laterally within a network once an initial exploit is used to gain persistent access for the purpose of establishing furt
    10·1 answer
  • A message M is encapsulated by the TCP, IP and Ethernet protocols in that order as it travels down a protocol stack. What does t
    5·1 answer
  • What tool can you use to discover vulnerabilities or dangerous misconfigurations on your systems and network
    5·1 answer
  • Which of these is not a valid form<br>layout in Microsoft Access?​
    11·1 answer
  • What<br>are<br>the features of secondary storage media​
    13·2 answers
  • Fill in the blanks to complete a summary of this part of the passage. For the power of Patents
    6·2 answers
  • Chức năng của hàm MOD(number, divisor)?
    7·1 answer
  • The development of online capabilities created the ________, an information- and communication-based electronic exchange environ
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!