list the four types of hardware​

Answers

Answer 1

Answer:

Input devices: For raw data input.

Processing devices: To process raw data instructions into information.

Output devices: To disseminate data and information.

Storage devices: For data and information retention.


Related Questions

Which statement about intellectual property is true? (CSI-7.6) Group of answer choices It is okay to use code you find on the internet, since it is searchable. Since intellectual property is about your ideas, they aren't covered by any laws. Documentation of your ideas isn't important to prove intellectual property. Laws are in place to cover your creative work, which includes code you have written.

Answers

Answer:

Laws are in place to cover your creative work, which includes code you have written.

Explanation:

Copyright law can be defined as a set of formal rules granted by a government to protect an intellectual property by giving the owner an exclusive right to use while preventing any unauthorized access, use or duplication by others.

A copyright can be defined as an exclusive legal right granted to the owner of a creative work (intellectual property) to perform, print, record, and publish his or her work. Also, the owner is granted the sole right to authorize any other person to use the creative work.

For instance, copyright law which protects the sharing and downloading rights of music is known as the Digital Millennium Copyright Act (DMCA).

An intellectual property can be defined as an intangible and innovative creation of the mind that solely depends on human intellect.

Simply stated, an intellectual property is an intangible creation of the human mind, ideas, thoughts or intelligence. They include intellectual and artistic creations such as name, symbol, literary work, songs, graphic design, computer codes, inventions, etc.

Hence, laws are in place to cover a person's creative work, and it includes code he or she have written.

NEED HELP FAST!
You sit down at a library computer, put the headphones on, and start playing a video. You cannot hear the audio. What are the first two things you should do to troubleshoot this problem?

laptop and headphones


Restart the computer.
Restart the computer.

Check the volume.
Check the volume.

Check to be sure the headphone jack is plugged in.
Check to be sure the headphone jack is plugged in.

Ask the librarian for assistance.
Ask the librarian for assistance.

Answers

check to be sure the headphone jack is plugged in and check the volume !

What are Apps?
How do we interact with them?

Answers

Answer:

Sliding elements in list format.

Cards.

Images.

Buttons.

Overflow screens.

Multiple selection app interactions.

Text input fields.Explanation:

Which class requires campers to work in teams to create a
project?

Answers

Answer:

Summer camp?

Explanation:

does anyone know the what the tuition fee is for UC Berkeley PER YEAR. My smooth brain can't find it ANYWHERE.

Answers

Answer:

Local tuition 14,253 USD and Domestic tuition 44,007 USD

2019- 20

Average cost before any aid is $39,376 but with aid it averages to $14,846

To figure out how to use her MacBook Pro graphics software to update designs originally created on a DEC10, Marianne needs to use a ______ language?

Answers

Answer:

Glue Language

Explanation:

I'm not 100% sure, but here is the definition.

Glue language- A programming language that can be used to provide interoperability between systems not originally intended to work together

What types of tasks can you complete using Microsoft Excel (name and describe at least 3)

Answers

Answer:

1) Data Entry and Storage. ...

2) Accounting and Budgeting. ...

3) Collection and Verification of Business Data. ...

4) Scheduling. ...

5) Build Great Charts. ...

6) Help Identify Trends. ...

7) Administrative and Managerial Duties. ...

9) Return on Investment.

How would you explain these three security risks (phishing, keylogging, malware) to a family member? What would you say to help them understand the dangers?

Answers

Answer:

1. Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

2. Keyloggers are built for the act of keystroke logging — creating records of everything you type on a computer or mobile keyboard. These are used to quietly monitor your computer activity while you use your devices as normal.

3. Malware is intrusive software that is designed to damage and destroy computers and computer systems.

Explanation:

All of these can be used to steal data & passwords

Phishing, keylogging and malware are different ways of illegally getting hold of user data to be used for fraudulent activities.

Phishing is performed by impersonation, where users or customers of a particular organization or platform are contacted by emails, text or call requesting them to provide sensitive on behalf of the institution.

Keylogging occurs when keystrokes of a user is being monitored without consent. The logged or captured keys can be used to log into the individual's information and retrieve sensitive data.

Malware involves the use of infected files delivered over a network to carry out cyber attacks capable of capturing tons of data illegally.

It is important to withhold sensitive information and contact service providers if any suspicious communication is received.

Similarly, visiting unauthorized websites should be avoided and the use of firewalls on computer system should be adopted.

Therefore, phishing, keylogging and malware are ways of perpetrating cyber crime.

Learn more: https://brainly.com/question/19588151?referrer=searchResults

Ken has discovered that a vice president of his company has been using his computer to send data about a new product to a competitor. Ken has identified an email from the vice president and has tracked the information to the person at the other company. Ken has archived the evidence that proves the data has been sent. What should Ken do next?a. Report the person through proper channels.b. Approach the VP and ask him about the email.c. Ignore the email

Answers

Report the person through proper channels

Fill in the blank to complete the sentence.
A non-
agreement is a written agreement that limits what a team member can tell other people about a project they are working on.

Answers

Answer:

disclosure

Explanation:

Project management can be defined as the process of designing, planning, developing, leading and execution of a project plan or activities using a set of skills, tools, knowledge, techniques and experience to achieve the set goals and objectives of creating a unique product or service.

A team can be defined as a group of people or set of individuals with various skill set, knowledge and experience coming together to work on a project or task in order to successfully achieve a set goal and objective.

This ultimately implies that, a team comprises of individuals, workers or employees having complementary skills, knowledge and experience needed to execute a project or task successfully.

A non-disclosure agreement is a written agreement that limits what a team member can tell other people about a project they are working on.

This ultimately implies that, a non-disclosure agreement defines or specifies the amount of information about a project that the team members are allowed to divulge to non-members. This is to ensure that the aim, goals, objective and effort put invested into a project isn't sabotaged or discredited.

Why is drive of value when pursuing a career in IT?
Without drive, a person may fall short in their career goals.
Drive is not of value.
Drive is only important when you work for Microsoft.
Drive is only needed when someone does not have a college degree.

Answers

Answer:

Drive is only important when you work for Microsoft.

What are the differences between save and save as
in four points.​

Answers

Answer:

The main difference between Save and Save As is that Save helps to update the lastly preserved file with the latest content while Save As helps to store a new file or to store an existing file to a new location with the same name or a different name

Answer:

The key difference among Save and Save As would be that Save aims to update the current content of the last stored file, whereas Save As aims to save a new folder or to save an existing file to a new place with the identical name or another title.

all you do is save and save .as you would be that save aims to update the current  content of the last  stored file to a new place with the identical

Explanation:

write short cut of
fully justified​

Answers

Answer:

To make text justified, select and highlight the text first, then hold down Ctrl (the control key) on the keyboard and then press J. To make the text left aligned again, press and hold down Ctrl on the keyboard and press L

please answer that and i'll gave you branlliest

Answers

num = float(input('Enter a number: '))

if num > 45.6:

   print('Greater than 45.6')

I wrote my code in python 3.8. I hope this helps.

What's your thoughts on people using Brainly for nonacademic purposes?

Answers

Answer:

it has its ups and downs i  mean if brainly didn't wan't us talking they shouldn'‘t have added friends and a inbox  It’s a great way to make friends and help with work  so it shouldn't be a problem

Explanation:

MARK ME BRAINLIEST PLZzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz

Students who understand what the teacher is saying do not need to take notes.
Please select the best answer from the choices provided
T
F

Answers

Trueeeeeeeeeeeeeeeeee

Answer:

false

Explanation:

edge 2022

Which type of app is the best choice when it is critical to be able to use the device's features but performance is not critical? native web hybrid mobile

Answers

Answer:

Hybrid.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are; planning, analysis, design, development (coding), testing, implementation and execution, and maintenance.

Some of the models used in the software development life cycle (SDLC) are;

I. A waterfall model: it can be defined as a process which involves sequentially breaking the software development into linear phases. Thus, the development phase takes a downward flow like a waterfall and as such each phase must be completed before starting another without any overlap in the process.

II. An incremental model: it refers to the process in which the requirements or criteria of the software development is divided into many standalone modules until the program is completed.

III. A spiral model: it can be defined as an evolutionary SDLC that is risk-driven in nature and typically comprises of both an iterative and a waterfall model. Spiral model of SDLC consist of these phases; planning, risk analysis, engineering and evaluation.

Basically, softwares are categorized into three (3) main categories based on the development platform and these are;

a. Web application.

b. Native application.

c. Hybrid application.

A hybrid application is a type of software application that is designed based on the combination of the elements of both web applications and native applications.

Typically, a hybrid application is a web application that is developed in a native application shell, using a standardized web programming language such as CSS, JavaScript, and HTML.

Generally, a hybrid application avails a programmer the opportunity to write a code for a mobile application once while accommodating or being compatible with multiple app platforms such as Android, Windows, iOS, etc.

Hence, a hybrid application is the best choice of an application when it's critical for the end users to be able to use the features associated with a device such as a mobile phone but performance isn't critical.

Answer: Hybrid

Explanation: Hybrid apps are suited to situations where performance is not critical but using the device’s features are.

What sort of negative outcomes are possible for this type of risk?

Answers

More details please?

Answer:

not enough to go on

Explanation:

In the space provided, explain the evolution of newspaper reporting, from the early 1900s to the Digital Age.

Answers

Circulation increased because more people became interested in the news. ... In that time, Yellow journalism led by William Hearst (New York Journal) and Joseph Pulitzer (New York World) managed the news in a sensationalistic way to attract more readers, and the circulation maintained its numbers.

The first newspaper,daily doings, was published by the ancient Romans in 59 BCE. In the new era, the newspaper is evolving continuously.

What is newspaper?

A newspaper is a bimonthly publication that contains written information on current events and is often typed in black ink on a white or gray backdrop.

The publication has gone through several changes during its lengthy and complicated existence.

Examining the history of newspapers can provide insight into how and why they have grown into the diverse media that they are today.

The first newspaper, daily doings, was published by the ancient Romans in 59 BCE, according to scholars. Despite the fact that no copies of this periodical have survived.

it is usually assumed that it chronicled events, assemblies, births, funerals, and daily gossip. These handwritten Avis, or gazettes, covered politics and military engagements.

Hence,the newspaper is evolved before 1900s and growing to a new digital Age.

To learn more about newspaper, refer:

https://brainly.com/question/21528399

#SPJ2

what are human made materials ?​

Answers

Answer:

Natural materials may include wood, cotton, fur, or wool. Human-made materials may include plastic, rubber, glass, and Styrofoam.

What is the default pixel resolution for Mac, PC and Linux builds?
Native
1920x1080
960x540
1280x720

Answers

Answer:

it should be 1920 by 1080

Explanation:

Answer:

chrome

Explanation:

One benefit of proprietary licensed software is that it

is free of cost

will always be supported.

has undergone quality assurance testing.

comes with a EULA that guarantees access to source code.

Answers

Answer:

has undergone quality assurance testing.

Explanation:

Requires the presence of patients and healthcare providers at different sites at the same time and often involves a videoconference link between the two sites

Answers

Answer:

Live Telemedicine

Explanation: Telemedicine is a modern system of heath care where the medical care provider and the patient or client utilise the advances in telecommunications to share information about the medical/health needs of a client. In most cases the medical care provider and the client are in different locations communicating virtually. Live Telemedicine is becoming acceptable throughout the world especially in poor and developing countries like Nigeria.

The concept of taking traffic that’s all aimed at the same node and delivering it to the proper receiving service is known as

Answers

Answer:

"Demultiplexing" is the right answer.

Explanation:

A procedure for retransferring into genuine distinct, independent signals a transmission combining numerous digital as well as analog components, is considered as Demultiplexing.Lending incoming different segments towards appropriate application-level procedures instead on the positive side of the recipient.

que es la felicidad??​

Answers

Se feliz el amor es nada

another word for Arithmetic Logic Unit​

Answers

Answer:

ALU

Explanation:

just to say it faster than having to say it...

Answer:

ALU

Explanation:

ALU is a functional part of CPU which perform arithmetic and logical operations.

impacto que ha tenido en la sociedad la educacion virtual​

Answers

Answer:

ʜᴏʟᴀ ɪᴅɪᴏᴛᴀ

ᴄᴏᴍᴏ ᴇsᴛᴀs

ᴇsᴛᴜᴘɪᴅᴏ

hi good morning
Type the name of the protocol for each protocol define on the table below

nonsense answers well be reported​

Answers

Answer:

1. SSH/Telnet.

2. SMTP.

3. DNS.

4. DHCP.

5. HTTPS/SSL.

6. FTP

Explanation:

1. Provides connections to computers over a TCP/IP network: the standard protocol used for this is SSH/Telnet, through port number 22 and 23 respectively.

SSH is acronym for secure shell.

2. Sends e-mail over a TCP/IP network: SMTP using port number 25.

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

3. Translates URLs to IP address: DNS using port number 53.

A Domain Name System (DNS) can be defined as a naming database in which internet domain names (website URLs) are stored and translated into their respective internet protocol (IP) address. This simply means that, DNS is used to connect uniform resource locator (URL) or web address with their internet protocol (IP) address.

4. Automates assignment of IP address on a network: DHCP using port number 67.

Dynamic Host Configuration Protocol (DHCP) is a standard protocol that assigns IP address to users automatically from the DHCP server.

5. Securely transports web pages over a TCP/IP network: HTTPS/SSL using port number 443.

HTTPS is acronym for Hypertext Transfer Protocol Secure while SSL is acronym for Secure Sockets Layer (SSL).

6. Transports files over a TCP/IP network: FTP using port number 20 or 21.

FTP is an acronym for file transfer protocol.

Explanation:

I guess there is no need of mine for giving ans now

as the above guy has explained everything

What is the purpose of including a section in a presentation?

to organize and name groups of slides
to leave comments on slides for other users
to delete all the slides in a presentation at once
to save a template for use in other presentations

Answers

Answer:

D. for a presenter to add notes and markings to a presentation

did the one above and got it wrong, picked this one second and got it right. edge 2021

PLEASE HELP ME ITS A TIMED TEST
Select all that apply.


Carmen wants to do a basic search on the Internet to find what software can be used to do data mining. Select each of the steps Carmen should complete.



A. Navigate to a search engine.


B. Type "software data mining."


C. List the synonyms for software.


D. Select the keywords "software" and "data mining."


E. Create a link.


F. Press Enter.


G. Form the question: What software can be used to mine data?

Answers

There are ways to mine data. The  steps Carmen should complete are:

Press Enter.Navigate to a search engine.Form the question: What software can be used to mine data?List the synonyms for software.Select the keywords "software" and "data mining."Type "software data mining."

What is data mining?

Data mining is regarded as the act or the process of sorting that is often done through a large data group to known the patterns and relationships that can help handle business issues via data analysis.

Note that Data mining methods and tools helps firms to predict future trends and as such can make more better and informed business decisions.

Learn more about data mining from

https://brainly.com/question/26885075

Other Questions
Does Amit drive a car safely (into statement) Answer 1-3 What are the correct answers No scammers Due soon answer ASAP I will give brainlest if corrrect!!!!! medidas que favorecen el consumo responsable de energa del microondas Three qualities of a good budget are What is the frequency of a 5 m wave traveling at the speed of 200 m/s A community college employs 88 full-time faculty number. To gain the faculty opinions about an upcoming building project, the college president wishes to obtain a simple random sample that will consist of 9 faculty number. He numbers the faculty form 1 to 88. PLS HELP 6th grade, I WILL MARK U AS BRAINLIEST PLSSS 2) 2(8r + 5) = 24 + 9r Write a c++ program that generates three random numbers. The first number should be between 0-30, the second number should be between 30-60 and the third number should be between 60-90. suppose your surface body temperature averages 90^0 F. How much radiant energy in micrometer would be emitted from your body. Determine the wavelength of maximum energy emission of your body, using Wien's law. HELPPPP PLEASEEHow much is Vince paid for one hour of work?A.$3.60B.$9.00C.$9.50D$12.00 Presente perOW IS INTormation rerarea Orrounder company.RetailCost$148,7401,359,000Beginning inventoryPurchasesMarkupsMarkup cancellationsMarkdownsMarkdown cancellationsSales revenue$285,0002,148.00096.20016,30031,8004,7002,209,000Compute the inventory by the conventional retail inventory method. (Round ratios for computational purposes to 0 decimal places, eg.78% and final answer to O decimal places, eg. 28,987.)Ending inventory using conventional retail inventory method$ A consumer advocacy group wants to determine whether there is a difference between the proportions of the two leading automobile models that need major repairs (more than $500) within two years of their purchase. A sample of 400 two-year owners of model 1 is contacted, and a sample of 500 two-year owners of model 2 is contacted. The numbers x1 and x2 of owners who report that their cars needed major repairs within the first two years are 53 and 78, respectively. What is the p-value of the appropriate test of hypotheses No links, provide explanation. 600% of what number is 72 please help me with those 2 1. A population is:A a group of one species in the same place at the same timeB a group of different species in the same place at the sametimeC all the organisms of one species in the same place at thesame timeD all the organisms of different species in the same place atthe same time Help please!!!What percentage of students scored between 90 and 100? What soes it mean total???? HELP I NEED HELP ASAP HELP I NEED HELP ASAP HELP I NEED HELP ASAP HELP I NEED HELP ASAPHELP I NEED HELP ASAP HELP I NEED HELP ASAP HELP I NEED HELP ASAP HELP I NEED HELP ASAPWhich of the following colors are incorrect on the following color wheel?