1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lawyer [7]
2 years ago
9

Which TWO of the following are input devices that are parts of a laptop computer?

Computers and Technology
2 answers:
Kay [80]2 years ago
4 0

its actually keyboard and touchpad!!

vampirchik [111]2 years ago
3 0

Answer:

Mouse and Keyboard.

You might be interested in
DOES ANYONE KNOW HOW TO CHAGE THE IP ON A COMPUTER?
MaRussiya [10]
Try downloading a VPN

8 0
3 years ago
which consumable would be used with a 3d printer? group of answer choices filament print ribbon toner cartridge ink
Anna35 [415]

Answer:

Filament

Explanation:

Filament is the plastics that 3d printers use to make objects.

7 0
1 year ago
What does clicking and dragging the fill handle in excel
Olegator [25]

Answer:

The fill handle copies the same values, formulas, or fills a series of dates, texts, numbers, and other data to a desired number of cells. ... Click and hold the handle, then you can drag up, down, across over other cells. When you release your mouse button, it auto-fills the content to the cells you dragged over.

5 0
1 year ago
To deny a host from sending HTTP traffic destined to a specific server you will need to apply a __________ Access Control List.
DedPeter [7]

I would a Standard Access control List

There are two common access lists: The standard and extended access list.  With the standard access list, it creates filters only on source addresses and is commonly used for server-based filtering. They are not as powerful as extended access lists. Standard Access lists are typically used for restricting access to a router through HTTP and HTTPS.  


6 0
3 years ago
Read 2 more answers
At the Data Link Layer of the OSI Model, what type of address is used to identify the receiving host?
Natalka [10]

Answer:

Mac Address

Explanation:

The MAC address or Media Access Control  is a unique identifier that each manufacturer assigns to their devices that can connect to the network.  They consist of 48 bits in hexadecimal form, grouped into 12 pairs of characters and each character is formed by four binary numbers, generally separated by a colon. MAC addresses are used in the data link layer of the OSI model, specifically in the lower Medium Access Control layer. An example of a MAC address could be:

10: 68: c5: 5e: 27: 3f.

6 0
2 years ago
Other questions:
  • What command would you use to list the text files in your
    7·1 answer
  • Explain briefly why every person in the world is not connected to the Internet.
    9·1 answer
  • PLEASE HELP ME Jimmy and his friends are creating a rock band and have decided to turn his garage into a recording studio. He wa
    9·1 answer
  • The browser on which you are viewing web pages is called the
    13·1 answer
  • The main part of your program has the following line of code.
    7·1 answer
  • A short-range wireless network is called:
    10·1 answer
  • What are some best practices for file management
    8·1 answer
  • The basic component of the drive train system is the ____________.
    12·2 answers
  • Which of the following is NOT an example of soft skill?
    10·2 answers
  • Compare the freedom available to the American media with the freedom available to media in other parts of the world. How does a
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!