Which of the following can be considered as peripheral devices?
A). Primary storage media
B). User interfaces
C). Secondary storage media
D). Operating systems​

Answers

Answer 1
Answer: A) Primary Storage Media


Explanation:

A computer peripheral is any external device that provides input and output for the computer
Answer 2

The option that can be considered as peripheral device's is Primary Storage Media. Thus, option A is correct.

What is a peripheral device?

A peripheral, also known as a peripheral device, is an auxiliary device used to input and output data from a computer.

Terminals, printer, outside floppy hard disks and other data storage devices, video displays, keyboards, interfaces cards, external memory adapters, and other input/output gadgets that might or might not contain digital circuitry are examples of peripheral devices.

The computer retrieves and stores the data in the primary storage device until the procedure is done, or the data is no longer needed. Primary storage devices include random-access memory (RAM), graphic card memory, and cache memory.

A computer peripheral is any outside device that allows the computer to receive and send data. Therefore, it can be concluded that  option A is correct.

Learn more about peripheral device here:

https://brainly.com/question/21080721

#SPJ2


Related Questions

whats the task of one of the computers in network called?

a. hardware server
b. software server
c. Web server ​

Answers

The answer that’s gonna be followed is a:hardware server I’m sure

Answer:

C

Explanation:

I guess that's the answer

1. how did the prototype help you think about your idea?
2. what was frustrating about making a prototype?

Answers

[tex] \: \: \: \: \: [/tex]

1. how did the prototype help you think about your idea?

it can clarifies the things about the products as well as the user flow.

2. what was frustrating about making a prototype?

There may be too much variation in requirements.

hope it helps

[tex] \: \: \: \: \: \: [/tex]

The __________ algorithm takes the ciphertext and the secret key and produces the original plaintext

Answers

The answer is decryption

When a method in the ________ class returns a reference to a field object, it should return a reference to a copy of the field object to prevent security holes.

Answers

stop normalising the american *smart answer*

PLEASE HELP!!! DECENT AMMOUNT OF POINTS!! DRIVERS ED


An automatic transmission is a mechanism that

A. automatically turns on your car

B. automatically turns off your car

C. selects the best gear for the situation

D. Connect your radio to air signals

Answers

Answer:

c. Selects the best gear for the situation.

Explanation:

A __________ is a thorough examination of each aspect of a network to determine how it may be compromised.

Answers

Answer:

A posture assessment. :3

What are some ethical issues related to data mining? In other words, what are some ways that companies may gather or use data that are not appropriate?

Answers

Data mining is not an easy task, as the algorithms used can get very complex and data is not always available at one place. It needs to be integrated from various heterogeneous data sources. These factors also create some issues. Here in this tutorial, we will discuss the major issues regarding −
Mining Methodology and User Interaction
Performance Issues
Diverse Data Types Issues

4.10.4 Inventory codehs python
i have no idea on how tp fix this, pls help:(

Answers

Answer:

between line 23 and 24, add:

    if num > 0:

(and indent the next line)

Explanation:

You want to suppress the "Now we have 0 left" message, and an additional if statement will do that for you.

In this exercise we want to use computer and python knowledge to write the code correctly, so it is necessary to add the following to the informed code:

  if num > 0:

Want to suppress the "Now we have 0 left" message, and an additional so for that is necessary to put between line 23 and 24, the code:

   if num > 0:

See more about computer at brainly.com/question/950632

7.4 Lesson Practice (projectstem): what is output if the user is enters 2?​

Answers

Answer:

18

Explanation:

lets go step by step.

the function called tryIt has a value, a variable named "a". this "a" variable will be whatever the user enters when the program says, Enter a number.

ok so if we enter "a" as 2, and b in the function will always be 7, and 2 + 7 equals 9,

and the ans variable (short for answer) will take the result of the function (9) and multiply it by 2,

then the answer is 18

which tool is used to create a selection by drawing it free hand? (ellipse/rectangle/free select/All) ​

Answers

Answer:

The lasso tool

By clicking down and dragging, the lasso tool allows you by freehand to draw the selection line. Many programs offer different types of lasso tools that can be used to make selections. The polygon lasso tool allows you to create a selection by clicking on individual points that connect to create a selection line.

true or false? multimedia components such as audio and video do not significantly contribute to increased computer network traffic.

Answers

Answer:

false

Explanation:

are you KIDDING ME? imagine streaming a 4k video through YT.. yeah you know how much storage and bandwidth that takes up? it is VERY BIG. this is false

multimedia components such as audio and video do not significantly contribute to increased computer network traffic. The statement is false.

What is multimedia ?

Multimedia is an user engaging type of  media which offers a variety of effective ways to give information to user and user  can interact with digital information through it.

Multimedia can act a   communication tool, it has many application like Education, training, reference materials, corporate presentations, marketing, and documentary application.

Multimedia use text, audio, video, graphics, and animation to give information in a dynamic way and it is a technological way of presenting information  with textual data like video conferencing, Yahoo Messenger, email, and the Multimedia Messaging Service ( MMS Service (MMS).

For more details regarding multimedia, visit

https://brainly.com/question/9774236

#SPJ2

PLEASE HELP! WILL MARK AS BRAINLIEST JavaScript can be implemented using the _________ HTML tags in a web page.​

Answers

Answer:

JavaScript can be implemented using JavaScript statements that are placed within the ...  HTML tag

Explanation:

Similar how CSS is applied to your HTML page, JavaScript is as well. JavaScript just needs one friend in the world of HTML—the script> element—unlike CSS, which employs link> elements to apply external stylesheets and style> elements to apply internal stylesheets to HTML. Let's find out how this operates.

What JavaScript, implemented using JavaScript statements?

Script statements in Java. JavaScript's statements are the instructions that inform the browser what to do. Semicolons are used to separate statements (;). The JavaScript code is made up of JavaScript statements, which the browser translates line by line.

The most widely used JavaScript framework right now is by far, React. Functional programming techniques are used in this basic framework to greatly simplify parallel programming and coding comprehension.

Therefore, JavaScript can be implemented using the (JavaScript statements) HTML tags in a web page.​

Learn more about JavaScript here:

https://brainly.com/question/13089689

#SPJ2

WILL MARK A BRAINLIEST!!! PLS HELP!!!




Never gonna give you up
Never gonna let you down
Never gonna run around and desert you
Never gonna make you cry
Never gonna say goodbye
Never gonna tell a lie and hurt you

Answers

Answer:

We've known each other for so long

Your heart's been aching but you're too shy to say it

Inside we both know what's been going on

We know the game and we're gonna play it

And if you ask me how I'm feeling

Don't tell me you're too blind to see

when trying to solve a problem, bret uses a logical, step-by-step formula called

Answers

The logical, step-by-step formula that Bret uses when trying to solve a problem is called an algorithm.

An algorithm refers to a standard formula (procedures) which comprises a set of finite steps or instructions that is typically used for solving a problem on a computer.

This ultimately implies that, an algorithm is a standard, logical formula containing the step-by-step rules for proffering a solution to a particular problem on a computer.

In this context, Bret uses a logical, step-by-step formula called an algorithm, when trying to solve a problem.

Read more on algorithm here: https://brainly.com/question/24793921

Which invention provided instant communication and information to a massive audience for the first time? a. Intranet c. Video b. Television d. Internet Please select the best answer from the choices provided A B C D.

Answers

Answer:

B. television

Explanation:

Answer:bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb

Explanation:

What is the advantage of learning through story compared to learning through personal experience?

A.
stories are “more real” than personal experience

B.
stories are easier to remember than personal experiences

C.
stories have no rules to follow

D.
you can learn from countless other lifetimes through stories

This is game design

Answers

Answer:

I think the answer would be D

Explanation:

it just seems to make the most sense

Answer:

Is D

Explanation:

Stories open doors which ususally take time to open and to explore in real life, the same thing happens when you use a book to do your homework. You use the book to get information which you don't know. The same is with reading stories, stories can be helpful since they can talk about a characters life mistakes, and experiences that the character has gone throught their life, which usually  might be helpful on real life.

You are designing an exciting new adventure game and you want to attempt to explain where items that are carried by the player are being kept. What inventory system should you use to this? O visual grid approach hyperspace arsenal weighted inventory pseudo-realistic​

Answers

Answer:

hYou are designing an exciting new adventure game and you want to attempt to explain where items that are carried by the player are being kept. What inventory system should you use to this? O visual grid approach hyperspace arsenal weighted inventory pseudo-realistic​

Explanation:

what are the 4 types of satellite?​

Answers

Communications Satellite.

Remote Sensing Satellite.

Drone Satellite.

Ground Satellite.

On average, people spend about _____ minutes per day on apps that do not make them feel good such as apps for dating, social networking, gaming, entertainment, news, and web browsing .

Answers

Averagely, people (end users) spend about 27 minutes per day on software applications (programs) that do not make them feel good.

A software can be defined as a collection of data or set of executable instructions (codes) that is typically used to instruct a computer on how it should perform a specific task and solve a particular problem.

Basically, software applications (programs) are broadly categorized into three (3) main groups and these are;

System softwareUtility softwareApplication software

An application software is typically designed and developed for the performance of a specific task rather than the operation of a computer system.

According to an American survey, people (end users) averagely spend about 27 minutes per day on software applications (programs) that do not make them feel good such as those focused on:

Social networkingDatingEntertainmentGamingNewsWeb browsing

On the other hand, people (end users) averagely spend about 9 minutes per day on software applications (programs) that make them feel good such as those focused on:

HealthExerciseReadingRelaxationEducation

Find more information: https://brainly.com/question/14379808

What are five don’ts of using a computer

Answers

Answer:

Do not eat or drink near technology

Do not open unexpected or unknown email attachments

Do not install unknown programs

Do not forget about updating apps

Do not force anything closed

Do not get it dirty or wet

Do not wash your computer

Do not punch your computer

Read only memory is primarily used for?

Answers

Answer:

Read-only memory is useful for storing software that is rarely changed during the life of the system, also known as firmware. Software applications (like video games) for programmable devices can be distributed as plug-in cartridges containing ROM.

Hope This Helps!!!

1.erros can easily be ____ 2.work is done in an ____ no mess environment 3.colors do not _____ and brushes are never ______ 4.stages and version (s) of the artwork can be _____ filed and easily 5. work can be transferred or _____ on almost any 6. work can be _____ and easily _____ to interested parties​

Answers

Answer:

1) corrected

2) organized

3) Fade and worn-out

4) saved

5) saved

6) organized and graphics

Software whose code is made freely available to others for use, augmentation, and resale is referred to as:

Answers

Answer:

Open Source Software

Explanation:

The secondary storage device that is LEAST portable is a
A. DVD
B. Flash drive
C. Floppy disk
D. Hard disk

Answers

Answer:

B. flash drive

Explanation:

because it is portable

what is the main circuit board inside the computer called?

Answers

Answer:

Motherboard is the main circuit board inside the computer.

You want to allow RDP 3389 traffic into your network for a group of users to access a particular workstation that has a special application in your office. Which endpoint security tool would you use to make this happen

Answers

Firewall Rules often monitor the control information that is present in individual packets. The endpoint security tool would you use to make this happen is firewall rules.

Rules are often known to be guarding looks into the control information.

The Rules often block or allow those packets using the rules that are spelt out on these pages.

It is also given mainly to computers or to policies that are assigned to a computer or collection of computers.

Learn more from

https://brainly.com/question/15681183

Memory of your familiar old e-mail password may block the recall of your new password. This illustrates

Answers

Answer:

Retroactive Interference

Explanation:

Memory of your familiar old e-mail password may block the recall of your new password, This illustrates a phenomenon known as proactive interference.

Proactive interference occurs when previously learned information interferes with the recall or retrieval of new information.

The memory of the familiar old e-mail password is interfering with the recall of the new password.

The interference happens because the old password is already deeply ingrained in the individual's memory, and when trying to recall the new password, the old password comes to mind automatically and hinders the retrieval of the correct information.

This interference can lead to forgetting or temporarily blocking the recall of the new password.

To learn more on Proactive interference click:

https://brainly.com/question/30320488

#SPJ6

Convert the binary (base-2) number 1110 1001 to decimal (base-10).

Answers

Answer:

233

Explanation:

alright bro, listen. lets do some QUICK MAFFS.

from right to left.. we start from 1, and then double the number. so it would kind of look like this:

128 64 32 16  8 4 2 1

ok so whenever you are converting binary to decimal, make sure you have those numbers underneath the ones and zeroes.

[tex]1 \ \ \ \ \ 1 \ \ 1 \ \ \ 0 \ \ 1 \ 0 \ 0 \ 1\\128 \ 64 \ 32 \ 16 \ \ 8 \ 4 \ 2 \ 1[/tex]

ok so you see how the ones and zeroes are perfectly above the reference we are using?

so each one that has a one, add the number underneath it together

128 + 64 + 32 + 8 + 1

equals 233

LISTEN. STAY AWESOME GAMER!

At the data science laboratory, the data scientists and data engineers are required to process millions of data every second to predict weather patterns and abnormalities. The data is then sent to all employees over a network, using a server.

State the type of computer system that is required for EACH of the following purposes..

Processing of scientific data ...........

Distribution of data over a network

Working from home .....

Answers

Answer:

the type of computer system that is required for processing of scientific data is : supercomputer

for distribution of data over a network :Client/server computing

working from home :A laptop

The computer that's needed for processing scientific data is the supercomputer.

The computer that is needed for the distribution of data over a network is the client or server computer while the computer that's needed for working from home is a laptop.

A supercomputer simply means a computer that has a high level of performance and has thousands of processors. The server computer provides functionality for other devices.

Learn more about computers on:

https://brainly.com/question/24540334

__________ is a procedure that allows communicating parties to verify that received or stored messages are authentic.

Answers

Answer:

Message authentication

Explanation:

Other Questions
Write 2 sentences comparing sustainability practices of Beijing and New York. Compare means, what is similar and what is different What is the value of x? the plexuses that lie on either side of the neck are the _____ plexuses. which is the correct answer??geometry The office supply superstore sells pens for 60 cents. Sophia uses 3 cups of peanut butter to make 51 peanut butter cookies. At this rate, how many cups of peanut butter does she need to make 153 peanut butter cookies? I need these answers Why do urban areas experience traffic congestion Complete each sentence using the correct progressive tense.Mientras ta la escuela, yollegu en autobs.estabas manejasestabas manejandoestuviste manejandoestas manejandoQuestion 21 pts What is known as assets? French King Louis XIV stated: I am the State. This illustrates which type of government?A. Code of LawB. Democratic RuleC. Rule by LawD. Rule by Man At the data science laboratory, the data scientists and data engineers are required to process millions of data every second to predict weather patterns and abnormalities. The data is then sent to all employees over a network, using a server. State the type of computer system that is required for EACH of the following purposes.. Processing of scientific data ........... Distribution of data over a network Working from home ..... essay in luckiest day of my life how did the destroyers for bases agreement president Original price of shorts $53.95 Discount 30% Tax 4.5?Please help whats the correct answer ??? -7(8) What is it please help me I need help help help help 60Comparea 15% of 17 and 17% of 15b1.2% of 48 and 12% of 480147% of 621 and 125% of 54980% of a and 40% of 2af36% of 2.5b and 1.5% of 80b the ground wire on a household circuit is typically what color The tree clones are sapling ...Question 5 options:sequoiasredwoodssycamores In Lord of the Flies, which boy suggests, "We'll have rules! Lots of rules!"?A. RalphB. Simon C. PiggyD. Roger