Answer:
Computer Monitors earned him maximum profit. For details, please check the attachment.
Explanation:
Please check the attachment.
Computer security is protection from theft or damage to their hardware, software, or information, as well as disruption or misdriection of the services they provide. As information security is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording, or destruction of information.
Answer:
D)All of above
Explanation:
This is the complete question
For a typical program, the input is taken using _________.
A)Files
B)Command-line
C)scanf
D)All of above
E)None of these
computer program could be regarded as a collection of instructions which can be executed using computer to carry out a specific task, and it is written by programmer ,Input in domain of computer could be explained as feeding some data into a program. This input could be in the form of a file as well as command line, with the help of programming set of built-in functions that will help in reading the given input as well as feeding it to the program base on requirement. The scanf do reads the input from the standard input stream( stdin and scans) which is been input based on provided format. It should be noted that For a typical program, the input is taken using Files, Command-line and scanf.
Answer:
Access is a database management system from Microsoft.
Explanation:
Access allows users to view, edit and delete data, manage database tables, forms, queries, reports and macros.
Access should be use instead of Excel when you need to manage data and have it organize, easy to search and available to different users. If you need to be able to track information that is in different categories but is related, Access is a better option.
C, microphone, mouse scanner all send inputs to the system :)