1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NARA [144]
2 years ago
9

(C) Describe about the different types of computer peripherals and memory devices.

Computers and Technology
1 answer:
Alecsey [184]2 years ago
3 0

<em>Computer peripheral device</em>

<em> Monitor.</em>

<em> Monitor. Keyboard.</em>

<em> Monitor. Keyboard. Mouse.</em>

<em> Monitor. Keyboard. Mouse. Trackball.</em>

<em> Monitor. Keyboard. Mouse. Trackball. Touchpad.</em>

<em> Monitor. Keyboard. Mouse. Trackball. Touchpad. Pointing stick.</em>

<em> Monitor. Keyboard. Mouse. Trackball. Touchpad. Pointing stick. Joystick.</em>

<em> Monitor. Keyboard. Mouse. Trackball. Touchpad. Pointing stick. Joystick. Light pen.</em>

<em> </em><em>MEMORY </em><em>DEVICES </em><em>:</em><em> </em>

<em> </em><em> </em><em> </em><em>The main storage is the primary memory, and data and programs are stored in secondary memory. However, memory is not stored in the CPU, but the CPU would only be a mess of wires without it!</em>

<em>RAM (Random Access Memory) and ROM (Read Only Memory) are examples of primary storage. Secondary Storage Devices: Secondary storage is a memory that is stored external to the computer. ... Hard Disk, CD, DVD, Pen/Flash drive, SSD, etc, are examples of secondary storage.</em>

<em>Thus</em><em>, </em><em> </em><em>Computer storage is of two types: ... RAM (Random Access Memory) and ROM (Read Only Memory) are examples of primary storage. Secondary Storage Devices: Secondary storage is a memory that is stored external to the computer. It is mainly used for the permanent and long-term storage of programs and data.</em>

You might be interested in
What is LATEX ? <br>create a latex command
AVprozaik [17]

Latex is a software used for writing daily life issue like integrations,fractions ,limits .

Lets see an example

\\ \bull\tt\longmapsto \displaystyle{\int}vdx

\\ \bull\tt\longmapsto \displaystyle{\lim_{x\to 0}}

5 0
3 years ago
Under the Gramm-Leach-Bliley-Act (GLBA), banks must protect customer privacy. A given bank has just implemented its online banki
d1i1m1o1n [39]

Answer:

System/Application Domain and LAN-to-WAN Domain.

Explanation:

The Gramm-Leach-Bliley-Act is also referred to as the Financial Services Modernization Act of 1999. It was enacted by the 106th Congress of the United States of America and it requires that financial institutions explain to their customers the information sharing policies and ensure that customer sensitive data (privacy) is safeguarded.

This, under the Gramm-Leach-Bliley-Act (GLBA), banks must protect customer privacy.

In this scenario, a given bank has just implemented its online banking solution that allows customers to access their accounts and perform transactions via their computers or personal digital assistant (PDA) devices.

Hence, online banking servers and their public Internet hosting would fall within the System/Application Domain and LAN-to-WAN Domain.

In an IT infrastructure, there are seven main domains and these are the: User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, Remote Access Domain, WAN Domain, and System/Application.

3 0
3 years ago
List any three importance of computer​
Naddika [18.5K]

Answer:

here is the answer

Explanation:

1) accurate

2) fast

3) can accomplish tasks more effencily

5 0
3 years ago
What are the tools which are used by search engine ? explain them? ​
bagirrra123 [75]
Java script and python for the UK
4 0
3 years ago
What is the typical relationship between time and interest rate?
prisoha [69]
The relationship between time and interest is: time allowed to repay the loan (monthly payments)
7 0
3 years ago
Other questions:
  • The purpose of an experiment is often based on ? A. new theories B. observations C. opinions of famous scientists D. beliefs of
    10·1 answer
  • Before using large downloaded files that are in a compressed format, it is necessary to_____ them. A) Copy B) Extract C) Open D)
    9·1 answer
  • Random letter of the alphabet for Python coding
    11·2 answers
  • Sam wants to use the rule of thirds to capture the essence of his image. How will he apply this rule in his image to get a pleas
    6·1 answer
  • Two-dimensional random walk (20 points). A two-dimensional random walk simulates the behavior of a particle moving in a grid of
    14·1 answer
  • You are given a 11-bit floating point representation with 1-sign bit, 3 bits for the exponent, and 7-bits for the mantissa. Expr
    9·1 answer
  • Why is know app downloading in my android phone even if I have 900 MB ???
    8·2 answers
  • Cuantos puntos de habilidad se puede tener en clubes pro?
    9·1 answer
  • The pH scale is_____ ?
    5·1 answer
  • Convert 1/32 GB into MB​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!