1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aivan3 [116]
2 years ago
5

The output of a computer can be seen on ( monitor, keyboard or mouse )​

Computers and Technology
2 answers:
Ket [755]2 years ago
8 0

Answer:

I'm pretty sure it's monitor

Explanation:

son4ous [18]2 years ago
6 0

Answer:

monitor

Explanation:

keyboard and mouse are inputs

You might be interested in
In 4-bit two's complement representation, what is the binary encoding of the number -5?
Katena32 [7]

Answer:

a) 1011

Explanation:

In 4 bit two's complement representation, the first bit is the sign bit.

If the sign bit is 1, the number is negative.

If the sign bit is 0, the number is positive.

What is the magnitude of the sign bit?

In n-bit two's complement representation, the magnitude of the sign bit is:

2^{n-1}-1

So, in 4-bit two's complement representation, the magnitude of the sign bit is:

2^{4-1}-1 = 8

Since the number is negative, the value of this bit is -8.

The other bits are magnitude bits, positive.

We have that the sum of these bits must be -5, and we already have -8. So what should be the value of these last 3 bits?

First, i am going to solve this equation to find the decimal value of the last three bits.

-5 = -8 + x

x = 3

So, the last three bits are:

3_{10} = (011)_{2}

The binary encoding of the number -5 is:

a) 1011

5 0
3 years ago
What do you call the specific format that is used to give credit to someone else’s work, words or ideas?
Deffense [45]
It would be called a citation.
6 0
2 years ago
Read 2 more answers
What type of protocol provides a way to transfer files from one computer to another over tcp/ip such as lan?
leva [86]
FTP provides this functionality.
5 0
3 years ago
(01.01 LC)
zloy xaker [14]

Answer:

Create web and mobile applacations

Explanation:

6 0
2 years ago
Which term is used to describe a network security device or host software that filters communications, usually network traffic,
morpeh [17]

Answer:

The correct answer is option (D).

Explanation:

According to the scenario, the most appropriate answer is option (D) because the firewall can be defined as the software program which checks through the network for incoming and outgoing communication on predefined rules.

while the other options are wrong because of the following reasons :

  • A sniffer can be defined as the program which is used to check the network traffic but it didn't work on predefined rules.
  • An auditor can be defined as a program that is used to analyze the network.
  • The hacker can be a person who hacks the system to gain access or gather information.
4 0
3 years ago
Other questions:
  • Which utility would you use to test communication on your own computer using your ip address as a parameter?
    10·1 answer
  • To insert a new slide in an existing presentation, what menu should you select?
    5·2 answers
  • Write a method called makeLine. The method receives an int parameter that is guaranteed not to be negative and a character. The
    11·1 answer
  • Write a copy constructor for carcounter that assigns origcarcounter.carcount to the constructed object's carcount. sample output
    15·2 answers
  • We use a cubic equation in which the variables and coefficients all take on values in the set of integers from 0 through p - 1 a
    8·1 answer
  • Basics AutoCare is a small auto service business with two locations in a Midwest (U.S.) city. The business is based on providing
    13·1 answer
  • Which method is an easy way to find a short description of a function?
    5·2 answers
  • Explain one way in which programmers may get hired.
    9·1 answer
  • Assuming dataFile is an ofstream object associated with a disk file named payroll.dat, which of the following statements would w
    9·1 answer
  • After selecting the Slide Master tab (within the View tab), which actions can a user take to configure a slide master?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!