1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Trava [24]
3 years ago
11

Hardware device can be either internal hardware devices or external hardware devices.

Computers and Technology
1 answer:
mariarad [96]3 years ago
6 0

Answer:

Yes

Explanation:

Because keyboard and mouse are external hardware and not inside the CPU cabinet but hardwares such as heat sink, sound card and graphic card are external hardware.

You might be interested in
Who could vote in the first democracy?
zmey [24]
B citizens

in the 4th century there were about 100k citizens. only about 40k could participate in the democratic process ( this is only if the question is referring to ancient democracy )
4 0
3 years ago
Please help me with this! I’m using Python 3
IgorLugansk [536]

Something like this?

h1 = int(input())

m1 = int(input())

s1 = int(input())

h2 = int(input())

m2 = int(input())

s2 = int(input())

s = h2*3600 + m2*60 + s2 - (h1*3600 + m1*60 + s1)

print(s)

3 0
3 years ago
What is what is a network that is easy to maintain and cheap ​
kifflom [539]

Answer:

Click at the pic above and the ans will appear.

Hope it helps :)

4 0
3 years ago
After a suspected identity fraud case has been resolved, you should: AContinue to monitor your credit reports and accounts. BKee
AysviL [449]
The answer is C. Both A and B because in the case of identity fraud it would make sense to monitor both
4 0
3 years ago
Read 2 more answers
The Fibonacci numbers are 0, 1, 1, 2, 3, 5, 8, 13, ......., where each number is the sum of the two preceding numbers. Write a p
Andreas93 [3]
0,1,1,2,3,5,8,13,21,34,55,89,144,233,377,610,987,1597
8 0
3 years ago
Other questions:
  • 5. Are you more honest in your online communication? Explain your response.
    6·1 answer
  • Which of the following is a useful policy to minimize waste and mistakes?
    6·1 answer
  • A type TW cable containing two No. 12 copper conductors has a maximum overcurrent protection of
    7·2 answers
  • ____ technology is the same as that used in digital watches, or the time display on a microwave oven
    14·1 answer
  • In linear​ programming, what are restrictions that limit the degree to which a manager can pursue an​ objective?
    15·1 answer
  • In which area of the screen can features and functions of Word be accessed?
    9·2 answers
  • A company has an Aruba solution. The company wants to host a guest login portal with this solution, and the login portal must gi
    7·1 answer
  • Which function would you use to make sure all names are prepared for a mailing label? TODAY UPPER PROPER LOWER
    11·1 answer
  • The internet in this Packet Tracer network is overly simplified and does not represent the structure and form of the real intern
    11·1 answer
  • (iii) ............ characters can be stored in memo field. (a) 50 (b) 64000 (c) 255 (d) 200 ​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!