1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anni [7]
2 years ago
12

Identify and state the value of hardware components​

Computers and Technology
1 answer:
natulia [17]2 years ago
4 0

Answer:

Explanation:

Hardware is the most visible part of any information system: the equipment such as computers, scanners and printers that is used to capture data, transform it and present it to the user as output. Although we will focus mainly on the personal

You might be interested in
Create a program that allows the user to input a list of first names into one array and last names into a parallel array. Input
natita [175]

Answer:

The program in Python is as follows:

firstName = []

lastName = []

while True:

   fName = input("First Name: ")

   lName = input("Last Name: (Enter to quit): ")

   if not lName:

       break

   firstName.append(fName)

   lastName.append(lName)

for i in range(len(firstName)):

   print(firstName[i] . lower()+"."+lastName[i] . lower()+" mycollege . edu")

Explanation:

See attachment for complete source file where comments are used as explanation

Download txt
8 0
3 years ago
Ninety-two percent of the new information was stored on magnetic media, mostly in _____.
kiruha [24]

Answer:

The answer to the following question is the option "b".

Explanation:

In the computer system, Hard disks stand for the hard disk drive. It is also known as a hard disk. It locates inside the computer case. The hard disk drive is used to store an electromechanical data. That uses magnetic storage device that store and retrieve data. So the answer to this question is hard disks.

5 0
3 years ago
What two characteristics describe an ftp connection?.
Brrunno [24]
The first connection established is for traffic control and the second is created for transfer of a file.

Please mark as brainlest answers
5 0
2 years ago
Individuals and IT professionals have a responsibility to be aware of security threats and the damage they might do.
Veseljchak [2.6K]
The answer is true they will have to be responsible
6 0
2 years ago
You have local administrative rights to your computer running windows 7. you cannot find some of the operating system files on y
ElenaW [278]
<span>a. uncheck ���hide protected operating system files��� in folder options</span>
6 0
2 years ago
Other questions:
  • What are 2 ways that technology can negatively impact the environment.
    8·2 answers
  • The inventory tracking system shows that 12 laptop were on hand before a customer brings two laptops to the register for purchas
    9·1 answer
  • Why are ethics important in PR?
    8·1 answer
  • @anthonydboss23<br><br> it’s goldielove6 <br><br> .....this is not a question everyone ignore this
    11·2 answers
  • Suppose you're currently completing an examination online. When you're finished, you click on Reset Exam. Why would you do this?
    8·1 answer
  • This matches the domain name with the correct IP address:
    12·1 answer
  • Given two strings s and t of equal length, the Hamming distance between s and t, denoted dH(s,t), is the number of corresponding
    6·1 answer
  • Why do computers use binary code?
    12·2 answers
  • Which of these are tools used to diagnose and test code? Check all of the boxes that apply.
    9·1 answer
  • Which original VPN protocol is supported by most platforms but offers low levels of security?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!