1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aloiza [94]
3 years ago
9

What is the advantages and disadvantages of hardware devices and software devices ?

Computers and Technology
1 answer:
yulyashka [42]3 years ago
3 0

Answer:

Advantages of hardware:

Physical existence

Multitasking

Speedy

Disadvantages:

Costly as different equipment cost differently

Time consuming

requires space

Privacy issues

Explanation:

Advantages of Software:

Less costly

Improved privacy controls

Requires no space

Disadvantages:

Does not have physical existence

hacking and cyber attacks may steal important information

Regular updates required

You might be interested in
Write a programe to add two numbers using function with return type"void".
Grace [21]

Answer:

#include<iostream>

using namespace std;

//create the function which add two number

void addTwoNumber(int num_1,int num_2)

{

   int result = num_1 + num_2;  //adding

   

   cout<<"The output is:"<<result<<endl;  //display on the screen

}

//main function

int main(){

   //calling the function

   addTwoNumber(3,6);

   return 0;

}

Explanation:

First, include the library iostream for using the input/output instructions.

then, create the function which adds two numbers. Its return type is void, it means the function return nothing and the function takes two integer parameters.

then, use the addition operation '+' in the programming to add the numbers and store the result in the variable and display the result.

create the main function for testing the function.

call the function with two arguments 3 and 6.

then, the program copies the argument value into the define function parameters and then the program start executing the function.

6 0
3 years ago
A technician is trying to access a user's files and is unable to open any folder or file. Which of the following BEST describes
vodomira [7]

<em>The answer is </em><em>D. The technician does not have permission. </em>

<em> </em>

<em>Folders are locked that's why he couldn't open any folder or file. There must be a prompt telling him that he doesn't have an access or authority to open those files. This could be done via Folder sharing in the network. And a shared folder can be customized by assigning the proper and correct permission to each user.</em>

4 0
3 years ago
List the rules to keep in mind as you declare a variable in VB.NET
Eddi Din [679]
- What is your variable scope? Ie., in what parts of the program do you need it?
- Is it a value type or a reference type. Reference types must always be "newed". Value types are more expensive to pass as parameters.
- Does the type implement IDisposable? Then you should use it in a using { } clause.
- Is the type immutable (like string or DateTime)? Then making changes to it is more expensive than you may think.
7 0
3 years ago
The width to height proportion of a monitor is known as the
JulijaS [17]
The width-to-height proportion of a monitor is known as the aspect ratio.
6 0
3 years ago
Which is an ipsec protocol that authenticates that packets received were sent from the source?
fiasKO [112]

Answer:Encapsulating Security Payload (ESP)

Explanation:Encapsulating Security Payload (ESP) is a member of the IPsec protocol suite. It provides origin authenticity through source authentication, data integrity through hash functions and confidentiality through encryption protection for IP packets.

6 0
2 years ago
Other questions:
  • What is an implicit benefit to Monetary Policy?
    6·1 answer
  • True or false: a cover letter accompanies a resume to showcase a job-seeker’s personal life
    6·2 answers
  • What is data and instructions entered into the memory of a device
    11·1 answer
  • ___ involves connecting geographically remote computers into a single network and combining the computational power of all compu
    14·1 answer
  • When comparing different biometric systems, one of the most important metrics used is called the _________, which represents the
    14·1 answer
  • I need a good science fair name I’m doing a homemade water filter and I have no idea what the title should be plz help
    14·1 answer
  • How to learning algothrim bett
    5·1 answer
  • Which of the following is a key difference between a Windows 7 restore point and one you set yourself?
    11·1 answer
  • What are the differences between Cc &amp; Bcc in emails that are sent ?​
    8·2 answers
  • HTML question please help
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!