1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
In-s [12.5K]
3 years ago
7

What is inputted into a computer system?

Computers and Technology
1 answer:
Anna [14]3 years ago
4 0

Answer:

Hey mate.....

Explanation:

This is ur answer.....

<em>Input refers to any information, or data, that is sent to a computer for processing. Input is often sent to the computer from a device such as a keyboard, mouse, or other input device. Putting it simple, input is the act of entering data into a computer.</em>

<em />

Hope it helps!

Mark me brainliest....

FOLLOW ME!!!! :)

You might be interested in
When comparing different biometric systems, one of the most important metrics used is called the _________, which represents the
Airida [17]

Answer:

Crossover Error Rate(CER)

Explanation:

Crossover Error Rate is an important metrics in the biometric systems.It is the value of FRR and FAR when the sensitivity is framed so that FRR and FAR are equal. The Crossover Error Rate(CER) is suitable for quantitative comparison of different biometric devices, applications or solutions.

8 0
3 years ago
What is a defult? pls help if you wouldn't mind
Sunny_sXe [5.5K]

Answer:

a beginner or a novice

Explanation:

5 0
3 years ago
Read 2 more answers
You are configuring a firewall to use NAT. In the configuration, you map a private IP address directly to a persistent public IP
Ivan

Answer:

Option B (Static NAT) would be the correct choice.

Explanation:

  • Static NAT seems to be a method of NAT methodology used to navigate as well as monitor internet usage from some kind of specific public IP address to something like a private IP address.
  • Everything always allows the provision of web access to technology, repositories including network equipment inside a protected LAN with an unauthorized IP address.

Some other decisions made aren't relevant to the situation in question. So the above alternative is indeed the right one.

8 0
3 years ago
I analyze data, as a consultant, for companies making important business decisions. In order to get my point across, which of th
ladessa [460]

Answer:

3

Explanation:

I've just taken the test and made a 100. 3 is the most logical answer aswell, it has more of an effect than the others.

4 0
3 years ago
In which generation of computers are we in?​
qwelly [4]
It should be the Sixth generation
4 0
3 years ago
Other questions:
  • Name some of the file extensions for images and provide more information about one or two of them.
    12·1 answer
  • What is an effective way to display calculations in a Word document
    7·2 answers
  • If you have machines doing jobs, fewer staff are needed, therefore costs are
    5·2 answers
  • What problem with internal hardware components is similar to unplugged
    6·2 answers
  • The difference between a for loop and a while loop is that a for loop is a loop that happens for a certain number of times. A wh
    14·1 answer
  • What are the four types of technical drawing?​
    9·1 answer
  • Which of the following is a hardware component used to hold the BitLocker encryption key and ensures encrypted data is not acces
    5·1 answer
  • It is an island country; it fought against us in World War II; it is known for sushi.
    14·2 answers
  • Bob The Penguin is a real you-tuber, and he plays Mine-craft. Who is his owner?
    6·1 answer
  • Customer history is an example of what
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!