What is the collective name for input, output and storage devices?

Answers

Answer 1
The Complete Hardware System
Peripheral equipment includes all input, output, and secondary storage devices
Answer 2

The collective name for input, output, and storage devices is input, processing, output, and garage are together called the: system cycle.

What is IPO?

IPO refers back to the Input – Process – Output model. As the identify suggests, the IPO cycle is the entry & output after the system of the information. People ought to deliver enter first to get output, after which the enter ought to be processed to get the favored outcome.

The systematic system is referred to as a device cycle, which includes six levels: feasibility study, device analysis, device design, programming and testing, installation, and operation and maintenance. The first 5 levels are device improvement proper, and the closing degree is the long-time period of exploitation.

Read more about the storage devices:

https://brainly.com/question/26382243

#SPJ2


Related Questions

what are the uses of plotters​

Answers

Answer:

Plotters are use to produce the hard copy of schematics and other similar applications They are mainly used for CAE applications.They can print on a wide variety of flat materials

Hope it helps :)❤

Answer:

 Plotters are used to print graphical output on paper. It interprets computer commands and makes line drawings on paper using multicolored automated pens. It is capable of producing graphs, drawings....

Select the effective subject lines.


Timecard Machine Relocated

This Message Contains Some Important New Information About Company Operations

Please Use the New Form in the Revised Employee Manual for Filling Out Your Expense Reports, the Procedure Has Changed

Test Results Attached

New Expense Reporting Procedures

Servers

IT Department Closed for Server Maintenance

Answers

Answer:

dont click the link

Explanation:

Answer:

Please Use the New Form in the Revised Employee Manual for Filling Out Your Expense Reports, the Procedure Has Changed  

Servers

 

This Message Contains Some Important New Information About Company Operations

Explanation:

i did this on edge 2021 there is a quizlet with most of the questions

1. Harold Worden, then 56-years-old, stole Kodak property
that was worth millions of dollars. He had worked for
Kodak for over 30 years and did not return confidential
documentation when he left the company in 1992.
He attempted to try and sell his ill-gotten gains to Kodak's
competitors while trying to start his own consulting firm.

The following scenario is an example of?​

Answers

Answer:

Industrial espionage

Explanation:

Espionage is defined as the act of spying or the use of spies to acquire information on the activities and plans of a government of another country or those of a company in a competitive market

It is the practice of obtaining confidential or secret information and can be considered a felony depending on the case circumstances and the manner of damages caused by the act which is provable and made by the claimant

Industrial espionage is also known as economic espionage

RESEARCH TITLE FOR CSS

Answers

Explanation:

sksmsskdkdkdkdkkkkdkdkdkdkfkfkfkfkkfkggkhkkkkkbkjvk

How did imperialism lead to WWI? A The debate of the morality of imperialism created tensions around Europe b Native people were conquered and rebelled against Europe c Europe went into an economic depression when imperialism failed d European nations competed and made alliances to control colonies

Answers

Answer:

d. European nations competed and made alliances to control colonies.

Explanation:

The world War I was a period of battle between various countries from 1914 to 1918. It started formally on the 28th of July, 1914 and ended on the 11th of November, 1918.

Imperialism can be defined as a policy, ideology, or advocacy that sought to extend a country's power, dominion, authority and influence over another country through diplomacy, use of military force or colonization (direct territorial acquisition).

This ultimately implies that, imperialism is an advocacy or policy that is typically used to impose or extend a country's power, dominion, authority and influence. It simply means to seek colonies of other nations or countries.

Hence, imperialism led to WW1 because European nations competed and made alliances to control colonies.

In conclusion, there was an eagerness on the part of European Nations to gain colonial territories that were owned by other rival nations.

Which sentence best justifies the benefits of using enterprise systems?


Early systems (in the 1960s) focused on the automation of individual functions, such as financial accounting and inventory management, primarily in the manufacturing industry. In the 1970s, the systems allowed planning of product requirements. Resource planning then began, which included not just shop floor planning but finance, engineering, human resources, distribution, and project management planning activities as well.

We now use enterprise systems that integrate all functions, including inventory control, accounting, and human resources. These systems use a single database containing all the data that keeps the processes running smoothly. This ensures visibility, accessibility, and consistency. Extended ERP systems include CRM, SCM, and advanced planning and scheduling. New systems include capabilities for business intelligence and cloud-based computing.

Answers

The first sentence is true

Answer:

These systems use a single database containing all the data that keeps the processes running smoothly. This ensures visibility, accessibility, and consistency.

Explanation:

HELP FAST PLS
Do you care more about avoiding fees/costs, accumulating perks, convenience, etc?

Answers

Answer: Convenience

Explanation:

good job

Explanation:

i just need points but i need the answer too

Help Please! Computer science question !!!!!!!!!!20 points!!!

Answers

Answer:

45 abc

Explanation:

PLEASE HELP EVERYTIME I POST NO ONE ANSWERS Jamie was entering his expenses for the month in a spreadsheet. He got an error when he typed SOM instead of SUM to calculate the total. Which error would the spreadsheet have thrown up?


A.

#REF

B.

#VALUE

C.

#NAME

D.

#DIV/0!

E.

#####

Answers

Answer:

we both struggling LOLLL ive redone that mastery test 11 times and finally got it, its #NAME

Explanation:

Every time the variable mentioned in the formula is incorrect, Excel displays a Value error. As you can see in the figure below, there is a #VALUE! Error since cell A4 in the formula has text whereas the other 3 cells contain numerical values. Thus, option B is correct.

What error would the spreadsheet have thrown up?

Choose the worksheet you want to review for mistakes. If the worksheet was manually calculated, use F9 to run a new computation.Click the Formulas tab > Formula Auditing > Error Checking button if the Error Checking dialogue is not visible.

The most typical type of Excel error is this one. You will notice this error on the screen if the cell's value is empty or if the number inside the cell is split by zero.

Therefore,  For instance, You can see how DIV was used in the formula bar here.

Learn more about spreadsheet here:

https://brainly.com/question/8284022

#SPJ2

Use the drop-down menus to complete each statement. Two main versions of Outlook are the desktop app and the app. The has limited features, but is free to download and install, and geared toward tablets and phones. Having a more comprehensive set of features, the app must usually be purchased to install on traditional computers. Office 365 has become more popular recently because it gives access to all Office programs and .

Answers

Answer:

1) Mobile

2) Mobile app

3) Desktop

4) Is on the cloud

Explanation:

Ik its late for you but it'll hopefully help out others in the future

Answer:

Answer shown in image :)

Explanation:

Plz click the Thanks button!

<Jayla>

¿Consideran que nuestra sociedad chilena (modelo económico, los medios de comunicación, educación, la publicidad) promueve la satisfacción de las categorías de pirámide de necesidades Maslow?

Answers

La respuesta correcta para esta pregunta abierta es la siguiente.

A pesar de que no se anexan opciones o incisos para contestar la pregunta, podemos comentar lo siguiente.

¿Consideran que nuestra sociedad chilena (modelo económico, los medios de comunicación, educación, la publicidad) promueve la satisfacción de las categorías de pirámide de necesidades Maslow?

Lo que yo considero que más que promoverla, la realidad económica y política es avasalladora al grado de que la sociedad lucha todos los días por sobrevivir, en lugar de aspirar a las diferentes escalas de satisfactores que promueve la pirámide de Abraham Maslow.

La sociedad Chilena se mantiene en la base de esa pirámide, buscando satisfacer las necesidades fisiológicas y las necesidades de seguridad. Nos referimos a la comida, el sustento, la salud, el vestido, el calzado, y el trabajo. Las condiciones políticas y económicas han obligado al Chileno a mantenerse en esos dos primeros estratos de la pirámide.

El nivel social es muy importante pero ante las condiciones señaladas, el Chileno promedio no tienen mucho tiempo libre como para andar socializando.

Con respecto a la Estima, el reconocimiento y la autorrealización, sabemos que los medios masivos, pero particularmente la mercadotecnia y la publicidad, son aspiracionales y buscan influir para que la gente tenga una mente consumista y gaste lo que no tiene.

Sin embargo, considero, que las condiciones económicas no dan para andar aspirando a esos niveles de la pirámide.  

How are mathematics and computer science similar? Discuss any connections between numbers, logic, and other elements.

Answers

Answer:

Explanation:

Both mathematics and computer science use variables and logic in order to analyze, explain, and model real-world problems. Also mathematics is a very important part of computer science as the logic and algorithms in computer science require mathematics in order to device systems to solve these problems. For example, data structures in computer science require lots of linear algebra in order to traverse large data collections efficiently, while Artificial Intelligence would need calculus and linear algebra in order for it to be efficient.

In a single file, you wrote a bike class and used this line of code in the program.
bike A = bike('Acme', 111)
Which statement is true about the code in your file?
O The code to define your class (beginning with "class bike") must come after the line "bike A = bike('Acme' 111)."
The code to define your class (beginning with "class bike") must come before the line "bikeA = bike('Acme' 111)."
O The code to define your class (beginning with "class bike") cannot be in the same file as the line "bike A = bike('Acme' 111)."
O The code to define your class (beginning with "class bike") can come either before or after the line "bike A = bike('Acme' 111)."

Answers

Answer:

Explanation:

Based on the available options the one that would be correct would be that the code to define your class (beginning with "class bike") must come before the line "bikeA = bike('Acme' 111)." This is because the line of code declaring the object and initializing it needs to be able to grab the information of the class that it is creating an object of. To do this, the class would need to have already been compiled by the program. It is good practice to have each class definitions as its own separate files but this is not a necessity.

Answer: The code to define your class (beginning with "class bike") must come before the line "bikeA = bike('Acme',111)."

Explanation:

Edge 2022 Correct

Please help! No one is answering these correctly!
A gateway is a common network hardware component that does what?
enables a network to connect to other networks
verifies user credentials to grant network access
connects many devices to a network using a single port
allows specific kinds of data into different parts of a network
What is the best way to prevent the most common cause of network failure?
Avoid using USB cables for connecting devices.
Maintain careful records of networked devices.
Use up-to-date antiviral software to protect computers.
Upgrade routers and servers annually.

Answers

Answer:

it is either c or d

I'm 99.5% sure it is C tho

Every single device can be connected to every other device on network, making the network mesh. This statement is True or False? *
1 point
True
False​

Answers

Answer:

true

Explanation:

we can connect to any device which has a network connection

the S. I unit
(2) write out
Current
C
Voltage
3. Resistance
2.

Answers

Answer:

1) Ampere (A)

2) Volt (A)

3) Ohm (Ω)

name the statement which is used at end of each case from computer subject

(plz answer fast and correct i will mark as brainlist ......)​

Answers

Answer:

In computer programming, a statement is a syntactic unit of an imperative programming language that expresses some action to be carried out.[1] A program written in such a language is formed by a sequence of one or more statements. A statement may have internal components (e.g., expressions).

Many programming languages (e.g. Ada, Algol 60, C, Java, Pascal) make a distinction between statements and definitions/declarations. A definition or declaration specifies the data on which a program is to operate, while a statement specifies the actions to be taken with that data.

Statements which cannot contain other statements are simple; those which can contain other statements are compound.[2]

The appearance of a statement (and indeed a program) is determined by its syntax or grammar. The meaning of a statement is determined by its semantics.

Edmentum Plato Course - Learning in A Digital World: Strategies for Success

How can a student tell if a piece of research is current?


A.

The information was written recently or has been updated recently.


B.

The ideas fit with what is widely known about the topic now.


C.

The writer of the information is still writing other pieces.


D.

The website the information is from is up to date and still active.

Answers

Answer:

A

Explanation:

The information was written recently or has been updated recently.

computational thinking is define as​

Answers

Answer:

In education, computational thinking is a set of problem-solving methods that involve expressing problems and their solutions in ways that a computer could also execute.

Explanation:

Im just so smart. Just dont look at Wikipedia

What is the 1st operation that is calculated in a formula?

Answers

Answer:

i think the second one

8.6 Code Practice: Question 2
Copy and paste your code from the previous code practice. If you did not successfully complete it yet, please do that first before completing this code practice.

After your program has prompted the user for how many values should be in the array, generated those values, and printed the whole list, create and call a new function named sumArray. In this method, accept the array as the parameter. Inside, you should sum together all values and then return that value back to the original method call. Finally, print that sum of values.

Answers

Answer:

import random

def buildArray():

   amount = int(input("How many values to add to the array: "))

   array = []

   for i in range(amount):

       array.append(random.randint(10, 99))  

   return array

array = buildArray()

print(array)

def sumArray(array):

   return sum(array)

sum_array = sumArray(array)

print("The total is: ", sum_array)

Explanation:

this gave me 80%

In this exercise we have to use the knowledge of computational language in python to write the code.

We have the code in the attached image.

The code in python can be found as:

import random

def buildArray():

  amount = int(input("How many values to add to the array: "))

  array = []

  for i in range(amount):

      array.append(random.randint(10, 99))  

  return array

array = buildArray()

print(array)

def sumArray(array):

  return sum(array)

sum_array = sumArray(array)

print("The total is: ", sum_array)

See more about python at brainly.com/question/26104476

pLZ PLZ PLZ HELP I HAVE SO MANY MISSING ASSINMENTS. why is physical security so important and necessary for both personal users and businesses?

Answers

Physical security is important because a physical attack is perhaps the most fundamental kind of attack. ... Using a floppy drive or CD-ROM drive on a machine that does not support good BIOS security. Damage to or theft of important machine components, especially those that store data. Theft of an entire machine

conceited or self confident? why?

Answers

Answer:

self confident

Explanation:

self confident mean that u don't lose your hope and you can focus on your aim then u cann be success in any field

Answer: self confident because you should always love yourself and not need other people option or attention to motivate yourself

Explanation:

Which of the following is a table which can be rearranged to analyze data in a variety of ways?
A. Pivot Table
B. HLOOKUP Table
C. VLOOKUP Table
D. PivotLookup

Answers

Answer:

A. Pivot Table

Explanation:

Given that a Pivot Table is a form of a table in statistics that comprises various data of several tables in a shortened form.

This table is then used to carry out analysis of data in numerous ways to reach a meaningful conclusion to make a decision.

Hence, in this case, the correct answer is a PIVOT TABLE.

Join for a pack battle loud microphone.

Answers

you look like the battle passss

Which of the following is an example of a trade journal?

A.
Sports Illustrated

B.
Sports Business Weekly

C.
Tik Tok

D.
The New York Times

Answers

Answer:

since d is incorrect as you said the answer is b then Sports Business Weekly

PLEASE HELPPPPPPP What should you always disconnect before installing hardware inside a computer’s case?

A.
all cabling
B.
all internal components
C.
the CPU
D.
the internal DVD drive

Answers

Answer:

a) all cabling hope it helps

how do you hack someone's wifi. (Hacker needed)​

Answers

Answer:

Ask God he knows all

Explanation:

What is extraction, transformation, and loading? Group of answer choices It is a process of entering data, tracking data, and loading it into a database. It is a process that is performed at the end of the data warehouse model prior to putting the information in a cube. It is a process that is performed at the beginning of the data mining model. t is a process that extracts information from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse.

Answers

Answer:

It is a process that extracts information from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse.

Explanation:

Extraction, transformation, and loading can be defined as a process that extracts information from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse.

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.

What is ransomware
я​

Answers

Answer:

Ransomware is malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again. It has the ability to lock a computer screen or encrypt important, predetermined files with a password.

Explanation:

:)

Other Questions
Please answer right I will give you brainliest :) .fue un poeta chileno muy famoso. Pablo Escobar Pablo Neruda Pablo VerduraWhich one? Where do sperm go after leaving the epididymis?A. Vas deferensB. UrethraO C. Ejaculatory ductD. Seminiferous tubules What is the relationship between choices and consequences? 75 POINTS!!!!!!What was Prince Shotokus most significant contribution to the Japanese government during his reign?He created a constitution with his advisors.He abolished the countrys social hierarchy.He removed foreign influence from government.He gave more independence to the nations cities. 1. What is the shape formed by a horizontal cross-section parallel to the base of the right rectangular pyramid? A right rectangular pyramid is shown. The base is shaded.A. CircleB. Triangle C. RectangleD. Trapezoid For a program within a hospital to become certified by the Joint Commission, which of these must be true? Check all of the boxes that apply. The program must have 100 percent patient survival rates. The program must meet the Joint Commission Standards. The program must demonstrate no room for improvement in services. The hospital containing the program must be accredited by the Joint Commission. A straight wire, labeled as Wire A, lies horizontally on a tabletop and is oriented to run north-south. A conventional current of 1.0 amperes runs in the wire directed towards the north. A second wire, labeled as Wire B, is also laid on the tabletop oriented north- south. Which of the following statements is true? a. If Wire B carries no current in it and lies to the left (west) of wire A, then it will experience an attractive force to the right towards wire A). b. If Wire B carries a northward conventional current and lies to the left (west) of wire A, then it will experience an attractive force to the right (towards Wire A). c. If Wire B carries a northward conventional current and lies to the right (east) of wire A, then it will experience a repulsive force to the right (away from Wire A). d. If Wire B carries a southward conventional current and lies to the left (west) of wire A, then it will experience a repulsive force to the left (away from Wire A). Pls answer 1 and 2 and find the solution for me. (URGENT) Worth all my points 7.3 If correct Ill give brainlist THIS IS THE LAST ONE NUMBER 9 In ABC, mCBD = 80. What is the measure of CAD 2/10 convert to a decimal Please help with this spanish worksheet I really need help Help? I don't know how to work this one out Which group of words is most likely to be used in a court of law? Where dose mass of a willow tree come from I NEED HELP ASAP PLSDirectionsRead the instructions for this self-checked activity. Type in your response to each question, and check your answers. At the end of the activity, write a brief evaluation of your work.Activity Reread Im Nobody! Who Are You? and then answer each of the following questions in two to three sentences.Im Nobody! Who are you?Are youNobodytoo?Then theres a pair of us!Dont tell! theyd advertiseyou know!How drearyto beSomebody!How publiclike a FrogTo tell ones namethe livelong JuneTo an admiring Bog!Part AWhat is the main message of the poem? Support your answer with evidence from the text.Part B What type of reader would feel validated by this poem? Why?Part CWhat words or sentences indicate the tone and mood of the poem? Provide evidence from the poem to support your answer.Part DDo you agree with Dickinson that it is better to be Nobody than Somebody? Explain. Does this change your perspective of yourself and how you look at others?THANKS SO MUCH factorise6de-3de