1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
uranmaximum [27]
3 years ago
12

What type of device is a projector ? a. input b. memory c. output d. storage

Computers and Technology
2 answers:
hodyreva [135]3 years ago
8 0

Answer:

output

Explanation:

if I'm wrong sorryyy

DerKrebs [107]3 years ago
5 0

Answer:

Output

Explanation:

:D

You might be interested in
What are two most common types of microcomputers? a. IBM-style PCs and Macs c. Clients and Servers b. Mainframes and Minicompute
erik [133]
<span>a. IBM-style PCs and Macs</span>
5 0
3 years ago
The algorithm ____ is used to find the elements in one range of elements that do not appear in another range of elements.
Musya8 [376]

Answer:

A. set_union

Explanation:

The algorithm set_union is used to find the elements in one range of elements that do not appear in another range of elements.

4 0
3 years ago
Which property do you use to align an element horizontally with the left or right edge of its parent element?
Ugo [173]
A thank me later:) give me hearts
3 0
3 years ago
With the technology scaling and process improvement, do you think that existing CMOS will be able to exist in future?
Korolek [52]
Regardless of improvements, CMOS technology is very likely to dominate the semiconductor industry and will continue to evolve in the near future. Even in the present day of advanced CMOS, older TTL, RTL, and RTL designs are still able to find their markets. We can however, nevertheless, conclude that a newer and better approach will displace majority of current semiconductors. 
8 0
3 years ago
Give an example of a situation in which a compromise of Confidentiality leads to compromise in Integrity.Situation where confide
il63 [147K]

Answer: An example of such a scenario would be when the user name and password meant to allow access to a customers bank account statement is cracked by unauthorized people this causing alteration (in the form of data diddling attacks) in the data contained in the statement. This is a compromise in integrity.

Explanation:

Confidentiality entails securing things people want to remain secret. An account statement of a bank customer is a confidential document which is to be kept secret. A password allows access to it.

Integrity implies receiving a sent data/information as accurately as it came from a sender. A data diddling attack alter integrity because the original information is altered by an unauthorized person.

7 0
3 years ago
Other questions:
  • What following functions does browser perform
    5·1 answer
  • You are a cleared employee. You discovered fraud and waste of money related to a classified program within your agency. If you r
    9·1 answer
  • Please what's the answer to this
    14·1 answer
  • You are part of a testing team at a software business. Your job is to see how many concurrent users the system can host and how
    7·1 answer
  • Meaning of page break​
    8·1 answer
  • Can someone pls help me my notifications aren’t working, I need help ASAP ty!
    5·1 answer
  • Related to Image Classification
    13·1 answer
  • 2 4. What is one way to prepare for building a project budget? (1 point)​
    9·1 answer
  • How can I restore tabs that just unexpectedly close out of nowhere ?
    6·1 answer
  • many police departments coordinate youth-oriented programs as part of their prevention efforts. which of the following is not an
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!