1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Igoryamba
3 years ago
9

define the term computer hardware and its various types mentioning 5 examples of IP or devices with one diagram each​

Computers and Technology
1 answer:
I am Lyosha [343]3 years ago
6 0

Answer:

1- Computer hardware includes the physical parts of a computer, such as the case, central processing unit (CPU), monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers and motherboard. By contrast, software is the set of instructions that can be stored and run by hardware.

2-Computer hardware includes the physical parts of a computer, such as the case, central processing unit (CPU), monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers and motherboard.

3-

You might be interested in
Define generation of computer ​
steposvetlana [31]

Answer:

The generation of computer is define as the devlopment in computer hardware/software,their processing speed and their language.

I HOPE IT HELP YOU

5 0
2 years ago
To be fluent in computer language you must learn 8000 __________? (9 letter word)
zheka24 [161]

Answer:

I believe its Algorithm

Explanation:

4 0
3 years ago
Francis has designed a picture book appropriate for third graders. He wants teachers across the world to freely download use, an
mestny [16]

Answer:

The correct answer will be "Project Gutenberg".

Explanation:

  • Project Gutenberg continues to obtain lots of requests for authorization for using printed books, pictures, as well as derivatives from eBooks. Perhaps some applications should not be produced, because authorization would be included in the objects provided (as well as for professional usages).
  • You can copy, hand it over, or m actually-use it underneath the provisions including its license that was included in the ebook.

So that the above is the right answer.

8 0
3 years ago
Describe the concepts of Defense in Depth and Detection in Depth. Compare and contrast. What's different? What's similar?
olchik [2.2K]

Answer:

 The main concept of the defense in depth is that the various defensive mechanism series are used for protecting the data and the information in the system. This approach is basically used multiple layers to control the cyber security. It also mainly provide the redundancy for controlling the security failure in the system.

The detection in depth basically provide the redundant overlapping approach and it is used for detecting the security and also accomplish the response that are available in the security detection.  

5 0
4 years ago
I need help on my new iPhone 7 that I got I transfer my Sim card from my Samsung But before And after I put my Sim card in it wa
g100num [7]

Answer:

Sometimes phones do this, did you take it to the phone store?

Explanation:

In order to send and receive iMessages to your iPhone.

iMessage must be enabled. By doing this, you will associate your phone number with the email address used for your Apple ID or iCloud account.

6 0
3 years ago
Other questions:
  • ____ takes the idea of breaking down a program into separate and reusable functions to the next level by focusing on the encapsu
    10·1 answer
  • The _______ is the continuing development of the internet that allows everyday objects embedded with electronic devices to send
    11·1 answer
  • Which is true about POP3 and IMAP for incoming email?
    10·1 answer
  • An ordinary office environment needs computers that have multiple user account settings where each user is allocated private dat
    13·1 answer
  • In cell B20, enter a function to calculate the average attendance for 2018
    11·1 answer
  • IN C++ PLEASE!!!! Define a function FilterStr() that takes a string parameter and returns "Good" if the character at index 4 in
    7·1 answer
  • Filtering data in Excel Online keeps all data on the screen and highlights the content that fits your criteria.
    9·1 answer
  • 1.) Explain one way the internet has impacted the way we behave.
    7·2 answers
  • Which of the following techniques is a direct benefit of using Design Patterns? Please choose all that apply Design patterns hel
    12·1 answer
  • Please give answer before explanation
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!