1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elis [28]
3 years ago
7

which kind of system software tells the computer how to communicate with peripherals, such as a printer or scanner?

Computers and Technology
1 answer:
alisha [4.7K]3 years ago
8 0

Answer:

device drivers

Explanation:

You might be interested in
This type of brake fade is caused by the brake fluid becoming so hot that it boils:a. Fluid fade b. Hydraulic fade c. Heat fade
PolarNik [594]
Its is B)hydraulic fade
5 0
3 years ago
As you type your outline, click Demote to move a line of text
polet [3.4K]
<span>C. out one level. i hope this helps</span>
5 0
4 years ago
Read 2 more answers
Who are The Boys? EddieVR, YourNarrator, JoshDub, Mully, and last but most certainly not least, Juicy(FruitSnacks). Green gang o
malfutka [58]

Answer:

yes or no

Explanation:

6 0
3 years ago
When was the bible of luke written​
Gelneren [198K]
85 C.E. I think that is when it was written, but I’m not 100% sure.
3 0
3 years ago
Memory: 5 bit addresses Cache: 8 blocks All memory locations contain valid data If the memory location is 15. What is the Binary
VMariaS [17]

Answer:

see explaination

Explanation:

If the cache contains 2k blocks, then the data at memory address i would go to cache block index ( i mod 2k )

Memory address = 5 bit

Cache block = 23

So, if the memory location is 9, then binary address = 01001 and cache block = 9 % 8 = 1 = 001

if the memory location is 12, then binary address = 01100 and cache block = 12 % 8 = 4 = 100

if the memory location is 15, then binary address = 01111 and cache block = 15 % 8 = 7 = 111

6 0
3 years ago
Other questions:
  • What size hard disc is recommended for powerpoint writting
    14·1 answer
  • LITERALLY PLS ANYONE!!! 90 pointsss!
    7·2 answers
  • An attacker sets up a look-alike wi-fi network, tempting unsuspecting users to connect with the attacker's wi-fi network instead
    5·1 answer
  • Which binary signaling technique uses a scheme in which zero voltage represents a 0 bit and the voltage for a 1 bit does not dro
    11·1 answer
  • What adds the element carbon to the environment
    10·2 answers
  • True or False: It is illegal to park in a location that you block or create a hazard for other vehicles.
    11·2 answers
  • What option from the format tab should you use to remove unwanted parts of a picture
    8·1 answer
  • What is the process called when programmers look for and fix errors in code?
    5·2 answers
  • 15 _____ 3 = 0 Question 11 options: a) / b) % c) * d) //
    12·1 answer
  • What is the importance of test documentation?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!