1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mumz [18]
3 years ago
13

An example of computer hardware is ? A. keyboard B. app C. web browser D. operating system

Computers and Technology
2 answers:
MaRussiya [10]3 years ago
8 0

Answer:

option A

Explanation:

Computer hardware is the physical parts or components of a computer, such as the monitor, mouse, keyboard.

Flura [38]3 years ago
4 0

Answer:

D. Operating system

Explanation:

A keyboard is a secondary item like a mouse and is not apart of computer hardware and app is also not a computer hardware because its coding not hardware. Web Browser is a Internet thing not hardware.

You might be interested in
Write a Python function check_subset() that takes in two Python lists, representing sets of integers, A and B. Your function sho
wlad13 [49]

Answer:

  1. def check_subset(l1, l2):
  2.    status = False
  3.    count = 0
  4.    if(len(l1) > len(l2)):
  5.        for x in l2:
  6.            for y in l1:
  7.                if x == y:
  8.                    count += 1
  9.        if(count == len(l2)):
  10.            return True  
  11.        else:
  12.            return False
  13.    else:
  14.        for x in l1:
  15.            for y in l2:
  16.                if x==y:
  17.                    count += 1
  18.        if(count == len(l1)):
  19.            return True  
  20.        else:
  21.            return False
  22. print(check_subset([1,4,6], [1,2,3,4,5,6]))
  23. print(check_subset([2,5,7,9,8], [7,8]))
  24. print(check_subset([1, 5, 7], [1,4,6,78,12]))

Explanation:

The key idea of this solution is to create a count variable to track the number of the elements in a shorter list whose value can be found in another longer list.

Firstly, we need to check which list is shorter (Line 4). If the list 2 is shorter, we need to traverse through the list 2 in an outer loop (Line 5) and then create another inner loop to traverse through the longer list 1 (Line 6).  If the current x value from list 2 is matched any value in list 1, increment the count variable by 1. After finishing the outer loop and inner loop, we shall be able to get the total count of elements in list 2 which can also be found in list 1. If the count is equal to the length of list 2, it means all elements in the list 2 are found in the list 1 and therefore it is a subset of list 1 and return true (Line 10-11) otherwise return false.

The similar process is applied to the situation where the list 1 is shorter than list 2 (Line 15-24)

If we test our function using three pairs of input lists (Line 26-28), we shall get the output as follows:

True

True

False

6 0
3 years ago
To delete a comment, right click the comment and then select the ____ command.
aleksandrvk [35]

delete command is your answer i tink

8 0
3 years ago
Read 2 more answers
What port is utilized by secure imap (imaps?
DedPeter [7]
TCP port used for SSL Secured.
8 0
3 years ago
_________ Code that you write is called primary code, and code that the compiler produces after processing the primary code is c
Kazeer [188]

Answer:

The correct answer for the given question is  "source code"

Explanation:

When you writing a code in any programming language that code is known as  source code.The source code is also known as primary code, when source code is compiles it produce runtime code.

The source code is created by the compiler it can be easily understood by the human being.

for example in c language we write a source code after compilation it produces object code .

5 0
3 years ago
In an ipv4 packet header, what does the value in the internet header length bsignify?
ElenaW [278]
<span>The length of the IPv4 header</span>
8 0
3 years ago
Other questions:
  • When ordering a new​ zagflatz, customers must choose the style of three major​ components, each of which has about ten variation
    6·1 answer
  • The data structure used for file directory is called
    7·1 answer
  • Using Word, Maureen is writing an outline of a presentation she plans to give to her company. She will be showing a video during
    12·2 answers
  • What enables a website to recognize a computer as a return visitor (as opposed to a first-time visitor)?
    12·1 answer
  • In what year did alienware introduce alienfx lighting zones into their pc's?
    10·1 answer
  • Question 1
    8·1 answer
  • In what type of attack does the attacker have the ciphertext of several messages that were encrypted with the same encryption al
    14·1 answer
  • Which source would provide the best way to find valid information about climate change
    8·1 answer
  • According to the mil-std-6016 what are the requirements for information to be passed between and among joint forces and organiza
    11·1 answer
  • What is the missing line of code? &gt;&gt;&gt;from math th import &gt;&gt;&gt; Point = [1,5) &gt;&gt;&gt; bPoint [4.9]​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!