1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nana76 [90]
3 years ago
7

Which of the following is the term for a device (usually external to a computer) that is plugged into a computer's communication

Computers and Technology
1 answer:
Serjik [45]3 years ago
4 0

A device, usually external to a computer that is plugged into a computer's communication port or is connected wirelessly. Common peripherals are keyboards, mice, monitors, speakers, and printers

You might be interested in
Tres areas donde se aplica la ciencia y tecnologia
aksik [14]

Possible Answers:

- Medicemanto - Medicine, especially applied.

- Ingeniería - Engineering. Modern scientific engineering is making use of technology to help solve problems and understand cause and effects.

- Comunicación - Communication. Public broadcasting to raise awareness of environmental or other scientific concerns.

7 0
2 years ago
Any fact or set of facts, such as the words in a letter to a friend or the notes in a song, can become computer ____.
Alina [70]

I think the answer is... data

3 0
3 years ago
Consider the following scenario below and recommend a solution.
sammy [17]

your account has enabled profile pictures for your users, you can manage all profile pictures for your account. Profile pictures are public and automatically approved when users upload an image in their settings. Using profile pictures can make it easier to see the users in your account and managing them gives you the ability to keep the pictures appropriate.

If Gravatars are enabled for an institution in account settings, and a user has a Gravatar but chooses not to upload a profile picture, the Gravatar will display for the user's profile picture.

If a student views another student's user details in a course and reports a profile picture as inappropriate, you can review those profile pictures and approve, lock, or delete the picture. In the courses, instructors can remove profile pictures completely from a user's details page.

5 0
3 years ago
What is the system that consists of nonproprietary hardware and software based on publicly known standards that allow third part
il63 [147K]

Answer:

Open systems

Explanation:

Open systems are very different from Open Source applications or software, it should not be confused.

Open systems work with the blend of open software standards, portability, and interoperability. Computer systems that interoperate among multiple standards and vendors to ensure that computer resources (hardware and software) are not allotted to a particular vendor. Such computer systems are considered as open systems.

For instance, computer systems that run a Microsoft Windows OS can be considered as an Open system. This is because of their capability to run different versions of the Microsoft Windows OS on that particular computer system. More clearly, A computer with Windows 10 OS, can be used to install Windows 8 OS without any issue. That same computer system can run the Windows 7 OS. This makes the computer system and open system.

5 0
3 years ago
What are the five types of docs you can create an share with google docs
Mademuasel [1]

Answer:

Documents: For composing letters, flyers, essays, and other text-based files (similar to Microsoft Word documents)

google sheets logo Spreadsheets: For storing and organizing information (similar to Microsoft Excel workbooks)

google slides logo Presentations: For creating slideshows (similar to Microsoft PowerPoint presentations)

google forms logo Forms: For collecting and organizing data

google drawings logo Drawings: For creating simple vector graphics or diagrams

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • Sean is white hat hacker, who is demonstrating a network level session hijack attacks and as part of it, he has injected malicio
    6·1 answer
  • 1) why is software engineering considered engineering and not manufacturing?
    9·1 answer
  • Approximately, what percentage of Smartphone owners in America uses their mobile devices to access social media platforms?
    7·1 answer
  • Your customer, Mykel, is ordering a custom-built computer for his home office and isn’t sure which components should be the high
    12·1 answer
  • Can you combine a wireless and wired lan in the same home
    14·1 answer
  • Which CIDR network has the smallest possible number of hosts? a. 123.0.0.0/8 b. 123.45.0.0/16 c. 123.45.67.0/24 d. All have the
    10·1 answer
  • Random Walker Collisions In lecture, we saw how to model the behavior of a random walker on a 2D grid using a Monte Carlo simula
    8·1 answer
  • The data type of 17.3 should be ________________.
    12·2 answers
  • What is cyber security ???​
    8·1 answer
  • What are 2 ways computers can connect to a network?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!