1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NARA [144]
2 years ago
9

(C) Describe about the different types of computer peripherals and memory devices.

Computers and Technology
1 answer:
Alecsey [184]2 years ago
3 0

<em>Computer peripheral device</em>

<em> Monitor.</em>

<em> Monitor. Keyboard.</em>

<em> Monitor. Keyboard. Mouse.</em>

<em> Monitor. Keyboard. Mouse. Trackball.</em>

<em> Monitor. Keyboard. Mouse. Trackball. Touchpad.</em>

<em> Monitor. Keyboard. Mouse. Trackball. Touchpad. Pointing stick.</em>

<em> Monitor. Keyboard. Mouse. Trackball. Touchpad. Pointing stick. Joystick.</em>

<em> Monitor. Keyboard. Mouse. Trackball. Touchpad. Pointing stick. Joystick. Light pen.</em>

<em> </em><em>MEMORY </em><em>DEVICES </em><em>:</em><em> </em>

<em> </em><em> </em><em> </em><em>The main storage is the primary memory, and data and programs are stored in secondary memory. However, memory is not stored in the CPU, but the CPU would only be a mess of wires without it!</em>

<em>RAM (Random Access Memory) and ROM (Read Only Memory) are examples of primary storage. Secondary Storage Devices: Secondary storage is a memory that is stored external to the computer. ... Hard Disk, CD, DVD, Pen/Flash drive, SSD, etc, are examples of secondary storage.</em>

<em>Thus</em><em>, </em><em> </em><em>Computer storage is of two types: ... RAM (Random Access Memory) and ROM (Read Only Memory) are examples of primary storage. Secondary Storage Devices: Secondary storage is a memory that is stored external to the computer. It is mainly used for the permanent and long-term storage of programs and data.</em>

You might be interested in
Copyright laws protect:This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task a
agasfer [191]

B- Copyright laws protect original works both online and in print.

3 0
3 years ago
What is the energy conversion of solar water heaters?
Gelneren [198K]
A liquid-to-liquid heat exchanger uses a heat-transfer fluid that circulates through the solar collector, absorbs heat, and then flows through a heat exchanger to transfer its heat to water in a storage tank. Heat-transfer fluids, such as antifreeze, protect the solar collector from freezing in cold weather.
7 0
4 years ago
If someone you don’t know asks where you go to school, what should you do
My name is Ann [436]

Answer:

Don't answer him because you don't know what he is going to do

8 0
3 years ago
Why might an algorithm created to assist in hiring decisions be biased?
nika2105 [10]

Answer:

Previous decisions were flawed

Explanation:

An algorithm depends entirely on the data input into the system in the decision making process.

As such, when there are conclusions in the data set used by the algorithm for decision making which are distorted, such as the association of less individuals that drink and drive in the rich cities than can be found in poorer communities due to the presence of less bars uptown and as such drivers from uptown areas are given preference may include a bias that is due to conclusion on which the previous decisions were made and used in the algorithm which may have been flawed or need more detailed analysis

4 0
3 years ago
Write a program that prompts the user to enter two characters and display the corresponding major and year status. The first cha
nydimaria [60]

Answer:

  1. import java.util.Scanner;  
  2. public class Main {
  3.    public static void main(String[] args) {
  4.        Scanner input = new Scanner(System.in);
  5.        System.out.print("Please enter two characters: ");
  6.        String inputStr = input.nextLine();
  7.        if(inputStr.charAt(0) == 'B' || inputStr.charAt(0) == 'b'){
  8.            System.out.println("Biology");
  9.        }
  10.        else if(inputStr.charAt(0) == 'C' || inputStr.charAt(0)== 'c'){
  11.            System.out.println("Computer Science");
  12.        }
  13.        else if(inputStr.charAt(0) == 'I' || inputStr.charAt(0) == 'i')
  14.        {
  15.            System.out.println("Information Technology and Systems");
  16.        }
  17.        else{
  18.            System.out.println("Invalid major");
  19.        }
  20.        int num = Character.getNumericValue(inputStr.charAt(1));
  21.        if(num >= 1 && num <= 4){
  22.            switch (num){
  23.                case 1:
  24.                    System.out.println("freshman");
  25.                    break;
  26.                case 2:
  27.                    System.out.println("sophomore");
  28.                    break;
  29.                case 3:
  30.                    System.out.println("junior");
  31.                    break;
  32.                case 4:
  33.                    System.out.println("senior");
  34.                    break;
  35.            }
  36.        }
  37.        else{
  38.            System.out.println("Invalid year status");
  39.        }
  40.    }
  41. }

Explanation:

The code consists of two main parts. The part 1 is to validate the input major and print out the major according to the input character (Line 10 -22). If the input character is not matched with the target letters, a message invalid major will be displayed.

The part 2 is to validate the year status to make sure it only fall within the range of 1-4  (Line 26 -45). If within the range, the program will display the year major accordingly. If not a message invalid year status will be displayed.

4 0
3 years ago
Other questions:
  • Which one of these do not belong on the Do's list in Helpful Hints when preparing a presentation: Which one of these do not belo
    8·1 answer
  • Explain the third <br> generation
    6·1 answer
  • The methods of the Character class that begin with ____ return a character that has been converted to the stated format.
    5·1 answer
  • Front and rear camber and toe settings are being adjusted during a four-wheel alignment. The correct order for performing these
    13·1 answer
  • Write a program that prompts the user to enter the area of the flat cardboard. The program then outputs the length and width of
    15·1 answer
  • Complete each sentence
    10·1 answer
  • Old systems can be useful when designing new computer software.<br> True or False
    7·2 answers
  • You need to know more than just facts in order to use critical thinking skills.
    5·1 answer
  • Cybersecurity is defined as the set of techniques to protect the secrecy, integrity, and availability of computer systems and da
    7·1 answer
  • The most important preinstalled software is the ______ software that allows you to use the computer the first time you turn it o
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!