1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Drupady [299]
3 years ago
5

Which of the following is input devices? (a)Scanner (b) Keyboard (c) Both a and b (d) Plotter​

Computers and Technology
1 answer:
Anna35 [415]3 years ago
6 0

Answer:

C

Explanation:

Scanner and Keyboard are input device.

You might be interested in
How to hack the school system
Verizon [17]

Why Would You Need To " Hack" Your Schools Console??

Your school has your computer administrated, Go to developer settings then reboot the computer.

3 0
3 years ago
A bakery sells three types of muffins whose prices are as follows: 1- blueberry muffin, $2.98 2- chocolate chip muffin, $4.50 an
andreev551 [17]

Explanation:

The menu is provided as given in the question. A while loop is used to keep getting input from the user until the user enters exit value 0. If elif commands are used to keep track of the respective muffins. Three counters are used to keep the count of each muffin and at the end the quantity of each muffin is multiplied with the price of each muffin then added together to get the total bill.

Python Code:

menu="""****************MENU*******************

Please select your muffins:      

Press 1 for blueberry muffin $2.98      

Press 2 for chocolate chip muffin $4.50

Press 3 for banana muffin $9.98        

Press 0 for exit!                

***************************************"""

print(menu)

blue=0

chock=0

banana=0

flag=0

while flag==0:

   inp=eval(input())

   if inp==1:

       blue+=1

       print("blueberry muffin added")

   elif inp==2:

       chock+=1

       print("chocolate muffin added")

   elif inp==3:

       banana+=1

       print("banana muffin added")

   elif inp==0:

       break

   else:

       print("invalid selection!")    

print("Your bill is: $",blue*2.98+chock*4.50+banana*9.98)

Output:

*******************MENU**********************

Please select your muffins:      

Press 1 for blueberry muffin $2.98      

Press 2 for chocolate chip muffin $4.50

Press 3 for banana muffin $9.98      

Press 0 for exit!

***************************************"*********

2

chocolate muffin added

3

banana muffin added

5

invalid selection!

1

blueberry muffin added

0

Your bill is: $ 17.46

7 0
4 years ago
True or False. Over the past few years, the hacking community has engaged in more "lone wolf" types of hacking activities as opp
Bingel [31]

Answer:

False

Explanation:

Hackers usually perform their attacks in teams, the idea of a lone wolf hacker (single hacker) executing an attack isn't frequent, they work together and have their team names and they are known for their various attacks done for various reasons, reason can be political, business, competition, and so on.

8 0
3 years ago
You work as an IT Technician for uCertify Inc. David, a user, has recently purchased a laptop computer. He is now complaining th
olganol [36]

Answer:

Check the hardware switch on the wireless antenna card that activates the service.

Explanation:

The person works for uCertify Inc as an IT Technician. David, a regular, has just buy a laptop. He still says that he will not link to a wireless connection, although his laptop seems to have an inner wireless app. So, by checking the hardware switch on the wireless antenna card that activates the service, that person resolves the issue.

7 0
3 years ago
________ uses shared computing resources instead of having local servers or devices to handle computing applications.
Oksanka [162]

Answer:

cloud computing

Explanation:

3 0
3 years ago
Other questions:
  • Speech on inventors and inventions
    14·1 answer
  • Which part of an I-statement involves a description of your needs or feelings?
    12·1 answer
  • You can change the location of the layers panel on the screen by _____ .
    7·1 answer
  • Most colleges require blank years of foriegn language for admission
    9·1 answer
  • Project management software helps you develop a ______________, which serves as a basis for creating Gantt charts, assigning res
    15·1 answer
  • intext:"The browser feature which enables tabs to work independently from one another so if one crashes, the others may continue
    12·1 answer
  • Write a javascript program that reads three integers named start, end, and divisor from three textfields. your program must outp
    6·2 answers
  • Which of the following are breach prevention best practices?Access only the minimum amount of PHI/personally identifiable inform
    11·1 answer
  • Authentication is a mechanism whereby unverified entities or supplicants who seek access to a resource provide a label by which
    12·1 answer
  • Preventive Maintenance will will reduce potential hardware and Software Problems. Select two factors based on which Preventive m
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!