1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
strojnjashka [21]
3 years ago
11

List 5 peripheral device and state their function​

Computers and Technology
1 answer:
JulsSmile [24]3 years ago
6 0

Answer:

Printer - displays text or pictures on paper

Scanner - creates a digital representation of paper

Optical Mouse - translates muscle movements onto a cursor

External hard drive - used for storing files

VOIP phone - places phone calls using the VOIP protocol

You might be interested in
Which collaboration website is best suited for social collaboration? www.media.iearn.org/projects www.meetup.com www.quest.nasa.
olga55 [171]
The first option is the correct answer
6 0
3 years ago
Which password attack method uses long lists of words that have been predefined and can be quickly downloaded for use to break a
vova2212 [387]

Answer:

A dictonary attack.

Explanation:

Dictionaries hold many words that can be downloaded and used. Word or name passwords are usually just one word or maybe two. In other words, predefined words being used as a password? Not safe. When someone attempts to crack it, they use brute force attacks. Among these are dictionary attacks, which focus on the actual words rather than numbers.

3 0
2 years ago
This operator represents the logical AND.
sdas [7]

Answer:

C. &&

Explanation:

Of the options provided:

A) ++ : increment operator. For example : ++1 = 2

B) || : Logical OR operator. A || B is true if any one of A or B is true.

C) && : Logical AND operator. A && B is true if both A and B are true.

A            B         A && B

False    False      False

False    True       False

True     False      False

True     True        True

D) @ : Ampersand character (commonly used in email addresses) e.g, [email protected]

3 0
3 years ago
What is the full form of EPROM (CLASS-6)
vodomira [7]

Answer:

earth planet rest orbit moon

4 0
3 years ago
Read 2 more answers
To enable grammar correction in powerpoint, you must first enable office ____ services.
sesenic [268]

Answer:

Grammar

Explanation:

8 0
2 years ago
Read 2 more answers
Other questions:
  • Which of the following is not a network connection LAN WAN SAN MAN
    6·1 answer
  • The prediction that the number of transistors on a chip would double about every two years is known as ________. Metcalfe's law
    6·1 answer
  • A function operates on this, which may consist of a constant, a cell reference, or another function.
    7·1 answer
  • In linear​ programming, choices available to a decision maker are called
    12·1 answer
  • Which item would you most likely keep in a database
    9·2 answers
  • Describe the photograph that David begins discussing what is the contacts for the photograph
    7·1 answer
  • Which type of loan is based on financial need
    6·1 answer
  • What are some positive impacts technology has on the environment?​
    5·2 answers
  • Which of the following is true about stateless applications?
    9·1 answer
  • What's the commission payout for auto bill pay if sold with a ga?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!