1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mice21 [21]
3 years ago
7

What is hardware?

Computers and Technology
2 answers:
Dennis_Churaev [7]3 years ago
7 0
The physical devices that make up a computer system
marta [7]3 years ago
3 0

Answer:

Computer hardware includes the physical parts of a computer, such as the case,[1] central processing unit (CPU), monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers and motherboard.[2]

Explanation:

By contrast, software is the set of instructions that can be stored and run by hardware. Hardware is so-termed because it is "hard" or rigid with respect to changes, whereas software is "soft" because it is easy to change.

Hardware is typically directed by the software to execute any command or instruction. A combination of hardware and software forms a usable computing system, although other systems exist with only hardware.

You might be interested in
. Why did the designers of the Synchronous Digital Hierarchy choose unusual values for data rates instead of the exact powers of
exis [7]

Answer:

the designer choose because it has many basic and advance feature and it is Synchronous digital hierarchy (SDH) and synchronous optical network (SONET)

refer to a group of fiber-optic transmission rates that can transport digital signals

with different capacities. And it feature is Almost all new fiber-transmission systems now being installed in public networks

use SDH or SONET. They are expected to dominate transmission for decades to

come, just as their predecessor PDH has dominated transmission for more than

20 years (and still does in terms of total systems installed). Bit rates in long-haul

systems are expected to rise to 40 Gbps soon after the year 2000, at the same

time as systems of 155 Mbps and below penetrate more deeply into access

networks.

2 they choose Because of these problems, the big cable networks use hybrid fiber-coax networks. The use of fiber increases the upstream bandwidth and reduces noise, making it easier for upstream data to reach its destination. But upgrading to hybrid fiber-coax is hugely expensive.

4 0
3 years ago
How many bytes of information can be stored on a hard drive?
CaHeK987 [17]
1,073,741,824 bytes.
3 0
3 years ago
You bought a monochrome laser printer two years ago. The printer has gradually stopped feeding paper. Which printer component sh
lilavasa [31]

Answer:

Pick up roller

Explanation:

you should first check the pickup roller component. This component is the part of the printer that picks paper up from the paper tray. The pickup roller links the printer and the paper. When the printer printer is running, the roller would take paper from the paper tray for the printer to print on. One of the issues it can have is Paper jam where the roller would stop turning so that it will no longer be picking papers up from the tray.

3 0
3 years ago
Orphan record example?
Goryan [66]

Answer:

If we delete record number 15 in a primary table, but there's still a related table with the value of 15, we end up with an orphaned record. Here, the related table contains a foreign key value that doesn't exist in the primary key field of the primary table. This has resulted in an “orphaned record”.

4 0
3 years ago
What is the limitation of the procedure forward()?
Rina8888 [55]

Answer:

sandwich breadtughug

Explanation:

Katty bread

5 0
3 years ago
Other questions:
  • What products use fabric manipulation
    8·1 answer
  • 6.67
    5·1 answer
  • What possible effects could cyber attack have on Johannesburg stock exchange
    6·1 answer
  • 1. Do you consider Facebook, MySpace, and LinkedIn forms of disruptive or sustaining technology? Why?
    15·1 answer
  • The Department of Homeland Security only deals with threats to national security and does not play a role in helping companies m
    13·1 answer
  • You need to write a class called SingleItemBox (in a file called SingleItemBox.java that you create). This class has a construct
    6·1 answer
  • Question 13(Multiple Choice Worth 5 points)
    6·1 answer
  • Five technology tools and their uses​
    5·1 answer
  • When was the first computer made?
    8·1 answer
  • PLEASE HELP!! THIS IS DUE SOON.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!