1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrey2020 [161]
3 years ago
10

Ten output devices you know

Computers and Technology
1 answer:
jasenka [17]3 years ago
6 0
Monitor
Printer
Headphones
Computer Speakers
Projector
GPS
Sound Card
Video Card
Braille Reader
Speech-Generating Device

You might be interested in
Jack was shocked to witness the sudden drop in performance of his laptop. He also found that the screen saver constant changed a
djyliett [7]

Answer: bootkit

This is the answer because the hacker was not trying to get any private information, so a bootkit would be the correct answer. A bookit uses a program to basically destroy your computer from the inside, starting from the motherboard.

Hope this helps!

8 0
3 years ago
If your DTP document contains watermarks on every page, where can you place them?
QveST [7]

Answer:

<h3>You can place watermarks and other recurring elements on a DTP document by following the points below:</h3><h3 />
  • Open the DTP document on which watermark is to be placed.
  • Click on Page Layout tab
  • Locate the Page Background group and click it.
  • Select the Watermark Option and then select Custom watermark.
  • A box will open when you click the Text Watermark.
  • Type the text you want and click on Insert.
  • All other changes can be done using options.

<h3>I hope it will help you!</h3>

6 0
3 years ago
Write a function writel that will write the length of a side of a square. If only one argument is passed to the function, it is
Levart [38]

def writel(length, file_name = ""):

   if file_name!="":

       f = open(file_name, "w")

       f.write(str(length))

       f.close()

   else:

       print(str(length))

writel(3, "FileName.txt")

I hope this helps!

Remember, you must have the file created prior to running this program. Best of luck.

7 0
3 years ago
Suppose that a database modification results in the execution of a trigger but that trigger generates another modification that
zhenek [66]

Answer:

The database can detect only system-defined events.

Explanation:

A trigger is like a stored procedure that Oracle Database invokes automatically whenever a specified event occurs.trigger is like a stored procedure that Oracle Database invokes automatically whenever a specified event occurs.

Both triggers and constraints can constrain data input, but they differ significantly.

A constraint applies to both existing and new data. For example, if a database column has a NOT NULL constraint, then its existing data is NOT NULL and no DML statement can violate the NOT NULL constraint.

A trigger applies only to new data. For example, a trigger can prevent a DML statement from inserting a NULL value into a database column, but the column might contain NULL values that were inserted into the column before the trigger was defined or while the trigger was disabled

5 0
4 years ago
Which of the following is not an advanced strategy you may use to help you conduct a search on the Internet?
Leno4ka [110]

Answer:

3-using a wild card in your search

7 0
3 years ago
Other questions:
  • If a program repeatedly shows separate feature branches rather than a true System Demo, which practice should be reviewed to add
    5·1 answer
  • What does deploying a computer mean?
    5·2 answers
  • If x is an int, which of the following statements adds 5 to the current value of x and stores the new value back in x?
    12·1 answer
  • Keep getting the message i failed to sign in to email on my phone but i can open my email. whats going on?
    10·2 answers
  • A stack queue can be implemented as a circular array stack dynamic linked list dynamic vector none of these
    5·1 answer
  • You have just built a new system from scratch. you turn the computer on but the system boot fails and sounds a beep code. what m
    15·1 answer
  • Availability is an essential part of ________ security, and user behavior analysis and application analysis provide the data nee
    14·1 answer
  • What is the name of the FOLDER in which the file named "script" is contained?
    13·1 answer
  • Explain why this scenario could put an organization in jeopardy of losing some of its workforce.
    12·1 answer
  • A trial-and-error method of problem solving used when an algorithmic or mathematical approach is called
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!