1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mariana [72]
3 years ago
6

Peripherals can be used to input information. True False

Computers and Technology
2 answers:
MariettaO [177]3 years ago
6 0

True, cause its actual job is to either be used as an input or output device in various ways but I hope this helps ma friend :)


ipn [44]3 years ago
6 0

True! Hope you pass!
You might be interested in
_____ is a method of access control that prevents unauthorized users from using an unattended computer to access the network and
Hoochie [10]

Answer:

Terminal Resource Security

Explanation:

Terminal Resource Security is a type of access control that prevents unwanted user from using a computer that is not in use to access the data and network. It is feature in a software that ensures that the screen of a computer is erased and a user is automatically signed off after a particular length of inactivity. It is used by many organizations.

5 0
3 years ago
material systems developer typically combines the skills of a programmer with the multitasking expectations of a .
SpyIntel [72]

Explanation:

Material systems developer typically combines the skills of a programmer with the multitasking expectations of developing 3 dimensional models of objects, enhancing the graphical effects.

The programmer simply does not have to translate the image but he needs to map the objects in some different ways that give it a 3D look. The object is composed of from material instead of simple modeling

8 0
3 years ago
100 POINTS!!!!
Alisiya [41]

Answer:

☆<em>intellectual property</em>☆

<u>intangible </u><u>a</u><u>s</u><u>s</u><u>e</u><u>t</u><u>s</u><u> </u><u> that result from intellectual</u><u> </u><u>p</u><u>r</u><u>o</u><u>p</u><u>e</u><u>r</u><u>t</u><u>y</u><u> </u><u>.</u>

<u>☆</u><u>I</u><u>n</u><u>t</u><u>a</u><u>n</u><u>g</u><u>i</u><u>b</u><u>l</u><u>e</u><u>☆</u><u>;</u>

<u>s</u><u>o</u><u>m</u><u>e</u><u>t</u><u>h</u><u>i</u><u>n</u><u>g</u><u> </u><u>t</u><u>h</u><u>a</u><u>t</u><u> </u><u>c</u><u>a</u><u>n</u><u>n</u><u>o</u><u>t</u><u> </u><u>b</u><u>e</u><u> </u><u>t</u><u>o</u><u>u</u><u>c</u><u>h</u><u>e</u><u>d</u><u>.</u>

<em>P</em><em>l</em><em>e</em><em>a</em><em>s</em><em>e</em><em> </em><em>M</em><em>a</em><em>r</em><em>k</em><em>☆</em>

<em>A</em><em>r</em><em>i</em><em>a</em><em>♡</em>

5 0
3 years ago
When you format text, what are you doing?
vova2212 [387]

Answer:

d

Explanation:

7 0
4 years ago
Read 2 more answers
All sensitive media on a laptop should be encrypted.
Inessa05 [86]

true very very true it could get stolen if not (well either way) but it is better encrypted

8 0
3 years ago
Other questions:
  • A. When executing System.out.println(a1), the toString() method in the Object class is invoked.
    14·1 answer
  • Computer Architecture
    7·1 answer
  • When completing an application what color ink do you use
    8·2 answers
  • PLEASE HELP WITH THESE QUESTIONS!!!! 19 POINTS!!!!!
    14·2 answers
  • Hands-On Project 15-4 Make Network Cables
    8·1 answer
  • The most infuential programming language is ______.
    7·1 answer
  • Write an expression that prints 'You must be rich!' if the variables young and famous are both True. Sample output with inputs:
    9·1 answer
  • Find the complete predicate in the sentence below.
    6·1 answer
  • HELP ASAP <br>please will mark brainliest<br>​
    5·2 answers
  • For robot arms the first three axes are called
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!