1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Xelga [282]
2 years ago
7

Discuss the different categories of computer hardware​

Computers and Technology
2 answers:
madam [21]2 years ago
7 0

Answer:

Input devices: For raw data input.

Processing devices: To process raw data instructions into information.

Output devices: To disseminate data and information.

Storage devices: For data and information retention.

IceJOKER [234]2 years ago
5 0
Computers are like you dad hard to find and access
You might be interested in
WILL GIVE BRAINLIEST! 20 POINTS! PLZ HELP!
alukav5142 [94]

Answer:

B

Explanation:

== returns true if both the left side and right side are equal

8 0
2 years ago
Read 2 more answers
How do news organizations primarily create revenue?
Tamiku [17]
D. through customer subscriptions
6 0
3 years ago
Read 2 more answers
What is the value of the variable result after these lines of code are executed?
notsponge [240]

Answer:

5

Explanation:

6 0
3 years ago
Read 2 more answers
8. Software ____ are individual programs that can be purchased, installed, and run separately, but extract data from the common
oee [108]
System software are software that can be installed and run separately
6 0
2 years ago
An access control system that grants users only those rights necessary for them to perform their work is operating on which secu
solmaris [256]

Answer:

B. Least privilege                

Explanation:

  • The principle of least privilege an important principle in computer security.
  • It limits the access rights for users and only grant them with the rights that are sufficient for them to perform their required task.
  • For example a user is granted privilege to execute a file or manipulate data or use only the resources that are required for them to perform a particular task.
  • This principle can be used only to limit and control access rights to system resources and applications.
  • The least privilege is beneficial as it reduces the risk of unauthorized access.
  • For example a user whose task is data entry and has nothing to do with controlling access or granting access rights to users, will only be allowed to enter data to the DB by the principle of least privilege.
7 0
3 years ago
Other questions:
  • 1.
    5·2 answers
  • Processing is handled by the computer’s central processing unit (cpu).​ <br> a. True <br> b. False
    6·1 answer
  • What is the purpose of the overload keyword in the ip nat inside source list 1 pool nat_pool overload command?
    8·1 answer
  • Which actions should be taken so that transitions proceed automatically? Check all that apply.
    12·2 answers
  • Effective display designs must provide all the necessary data in the proper sequence to carry out the task. Identify a recent pe
    12·1 answer
  • What inspired john logie baird to create the television?
    11·1 answer
  • If a triathlon is a sport combining three events, what do you think would be the word for a sport combining five events?
    7·1 answer
  • Caroline is building an expert system for wartime defense. Which of these is true about the system she is building?
    14·1 answer
  • What would a digitizing application create?
    13·2 answers
  • 2. what are the advantages of breaking up a single logical message into a number of fixed-sized packets and then sending each on
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!