1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vovikov84 [41]
3 years ago
10

List any four common hardware device​

Computers and Technology
1 answer:
olga55 [171]3 years ago
3 0

Answer:

mouse , desktop, printer, Cpu

You might be interested in
What type of camera is a cell phone camera
Sergeeva-Olga [200]

Answer:

A camera phone is a mobile phone which is able to capture photographs and often record video using one or more built-in digital cameras. It can also send the resulting image over the telephone function. The first commercial camera phone was the Kyocera Visual Phone VP-210, released in Japan in May 1999.

Explanation:

Hope this kinda helps you :)

3 0
3 years ago
Read 2 more answers
Which role is delegated to personnel of the IT department and is responsible for maintaining the integrity and security of the d
enyata [817]

Correct question.

Which role is delegated to personnel of the IT department and how is responsible for maintaining the integrity and security of the data?

Answer:

<u>data custodian</u>

<u>Explanation:</u>

Remember, every organization generates data, and large organizations generate even larger data.

Hence, the role of a data custodian in an organization requires He implements measures to protect the organization's data, store and backup the data, as well as granting access to the data to authorized persons when needed.

3 0
3 years ago
What is the difference between throughput and bandwidth?
masha68 [24]

Answer: Please find below the answer along with explanation.

Explanation:

For  a given communication channel (for instance, a LAN segment using Ethernet ) the Bandwidth refers to the theoretical maximum data rate that the channel can support, for instance, 100 Mbps in a 100Base T network.

The throughput, instead, refers to the actual data rate achieved in a given communications channel, taking into account the different channel impairments.

For instance, in a LAN segment that uses the original Ethernet 802.3 standard (CSMA/CD), a frequent occurrence of collisions can take down the actual data rate from the theoretical 100 Mbps to a very lower figure, i.e., 5 Mbps.

4 0
3 years ago
~ I already know this ~ who was the bits victim in five nights at freddys 4 <br> ___10 points___
Andreas93 [3]

Answer:

i dont know anything about them only that the bear is the ducks son and the duck is the fox mom.

Explanation:

6 0
3 years ago
Read 2 more answers
A customer wants to purchase a new home computer. The machine will mainly be used for internal browsing and streaming video, exc
Gekata [30.6K]

Answer:

Four-core processor

Explanation:

A four-core processor also known as a quad-core processor has four units cores that are independent and are responsible for reading and executing instruction in the central processing unit of a computer or system. It has high processing speed and is the best for gaming, and for multitasking purposes.

4 0
3 years ago
Other questions:
  • You are attempting to update a Windows image that has been mounted under C:\mount on your local system. What command must you us
    13·1 answer
  • The point at coordinates (2, -18) is in what direction from the origin?
    7·1 answer
  • PLEASE HELP POWER POINT:
    8·2 answers
  • Assuming a computer has a single processor and a single core with no support for parallel execution, explain why running a multi
    11·1 answer
  • Loops are frequently used to ____; that is, to make sure it is meaningful and useful.
    12·1 answer
  • What happens when two computers have the same IP address?
    13·1 answer
  • Which one is the answer for the question.
    11·1 answer
  • How is modern technology developed? Explain.
    14·2 answers
  • Reesa works for a large real estate company. She is responsible for installing and supporting the company's internet systems, in
    5·1 answer
  • Gaining information by tricking an individual into releasing information is often referred to as.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!