1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dahasolnce [82]
3 years ago
11

The _____________computer function accepts data from input devices and sends it to the computer processor.

Computers and Technology
1 answer:
iogann1982 [59]3 years ago
6 0

Answer: input

Explanation:

The computer function that accepts data from the input devices and sends it to the computer processor is refered to as the input function.

The input device is referred to as a hardware device which is used in sending data to a computer. Some examples of input devices that we have keyboard, mouse etc.

You might be interested in
PLEASE HELP!!<br> giving loads of points<br> create the python codes for the images
o-na [289]
I’m really bad with python lol
6 0
3 years ago
You need to deploy a new cloud-based windows intune deployment to manage mobile devices in your organization. drag and drop the
Elena L [17]

Answer:

step 1: sign up for an intune account

step 2: create intune user accounts

step 3: define intune policies

step 4: enroll mobile devices

step 5: link mobile devices to users.

Explanation:

The Microsoft Windows intune is a Microsoft cloud-based service that provides a central cloud service for all subscribed and linked devices. It provides a sense of security of data resource and tracking of device activities.

A company subscribes to intune to allow the use of both cooperate and BYOD (bring your own device to work), to access data. First, the administrator sign up and create the intune account, then defined the intune security policies. Then it enrolls the individual devices and links them to their respective users.

3 0
3 years ago
What is stored in alpha after the following code executes?
Daniel [21]

Answer:

Option 3: alpha = {3, 2, 9, 6, 8}

Explanation:

Given an an array, <em>alpha,</em> with 5 integer elements.

What happen inside the for-loop is that

  1. The current index-j will be multiplied by 2 and then assigned as the value of the element of the array indexed by j.
  2. If the index-j is an odd number (j % 2 == 1),  the previous element of the array, alpha[j - 1] will be assigned with value of alpha[j] + j. For example, given the alpha[0] = 0. If j = 1, alpha[j - 1] = alpha [0] = alpha[1] + 1= 2 + 1 = 3
  3. In short, the elements with even index-j are simply equal with 2 * index-j. Whereas the elements with odd index-j will always equal to  alpha[j - 1] = alpha[j] + j  

3 0
4 years ago
Sending an email to customer support before looking through the site and reading the frequently asked questions is an example of
IRINA_888 [86]

The correct answer is B. Doing your research

Explanation:

Before asking questions in a website or writing through customer support it is recommended to first do your research, this means looking for information on the internet or the frequently asked questions because in most cases the question you have in mind has been answered by the webpage or other people and therefore if you look by you own you can avoid sending emails or contacting people. This principle is basic when using the internet and implies only in case you cannot find the answer to a question you ask for help.

According to this, sending an email before looking through the site and reading the frequently asked question is an example of not doing your research, because it is supposed first you look for information on your own and just in case you cannot find anything you contact someone else.

3 0
3 years ago
Compare and contrast the uses of NetWitness Investigator and Wireshark used in the lab. Why would a network administrator use Wi
Ahat [919]

<u>Explanation:</u>

Note, the Wireshark software application is unique in that it has the ability to perform multiple layers of individual packet analysis.

Whereas in NetWitness Investigator software application, even though it doesn't go deeper like Wireshark, it can still detect new threats or problems in a network and then organized all of such information for the administrator.

So, in a sense, by using both applications, a network administrator can find the problems (using Wireshark), while another application (NetWitness Investigator) organizes them for him.

3 0
3 years ago
Other questions:
  • What was the first<br> 1:search engine<br> 2:website<br> 3:time the internet started
    6·1 answer
  • Sponse that best answers the question.
    11·2 answers
  • Please help I’ll give you 10 points
    8·2 answers
  • The ___________ command waits for windows 7 to save your work and then turns off the computer fans and hard disk. answer shut do
    11·1 answer
  • Some careers emerge to address the environmental impact human behaviors and processes might be having on our planet. True False
    9·2 answers
  • Convert 42DB5000 base 16 to base 10 floating point form assuming this is a signed floating point encoding (IEEE754) (32-Bit)
    10·1 answer
  • Which of the following transferable skills are generally the most look for in the it <br> field
    10·1 answer
  • The space that helps you organize your PowerPoint or Web Page is called ______.
    13·1 answer
  • Select the correct answer. Nancy has made a small web page with the new features of HTML5. She has to show this web page in scho
    9·1 answer
  • List different examples of models​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!