answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vlad [161]
2 years ago
9

What name are input devices, output devices, and auxiliary storage devices collectively known?

Computers and Technology
1 answer:
Oxana [17]2 years ago
5 0
Peripheral devices. hope this helps
You might be interested in
Which method allows a computer to react accordingly when it requests data from a server and the server takes too long to respond
Rina8888 [55]

Answer:

A. Request timeout.

Explanation:

The end devices like the computer systems in a network seeks to share resources with one another and/ or request resources from central server.

With this, there are two ways computers in a network can communicate. They are peer to peer network communication and client-server network communication.

The client-server communication requires a dedicated central server where computers in the network require data. Peer to peer describes a network where computers serve as both client and server to each other.

Request timeout is a message sent to a source when the time to live period (TTL) of a packet expires.

6 0
2 years ago
In mathematics, the notation n! represents the factorial of the nonnegative integer n. The factorial of n is the product of all
hram777 [196]

Answer:

The program to this question can be given as:

Program:

factorial=1 #declare a variable.  

number=int(input("Enter a positive integer:")) #input a number.  

while (number>0): #loop  

   factorial= factorial*number # holding value in factorial variable  

   number=number-1  

print('=',factorial) #print value.

Output:

Enter a positive integer:6  

= 720  

Explanation:

The description of the above python program can be given as:

  • In the above program firstly we define a variable that is "factorial". In this variable, we assign a value that is 1 and it is used to calculate the factorial value.  
  • We define a variable "number". The number variable is used to take input from the user.  
  • Then we define a loop in the loop we calculate the factorial and hold the value in the factorial value in the last we print the value.  

4 0
1 year ago
Which presenter would most likely benefit from a custom slide show?
PIT_PIT [208]
Which presenter would most likely benefit from a custom slide show?

a teacher who teaches four sessions of the same course
3 0
2 years ago
Read 2 more answers
A sum amounts to ₹2400 at 15% simple interest per annum after 4 years fond the sum.​
Elis [28]

Answer: $1,500

Explanation:

The future value of value using simple interest is:

Future value = Value * ( 1 + rate * time)

2,400 = Value * (1 + 15% * 4)

2,400 = Value * 1.6

Value = 2,400 / 1.6

Value = $1,500

6 0
2 years ago
What protocol communicates data between routers representing the edges of autonomous systems?Distance-vectorLink stateInterior g
Nata [24]

Explanation:

Exterior gateway protocol are the routing protocols that are used on the internet for exchanging routing information among the autonomous system. These autonomous systems can be gateway protocol, vector routing protocol.

8 0
2 years ago
Other questions:
  • Gloria needs to show in spreadsheet form the number of students in her class who speak different languages. Which type of graph
    7·1 answer
  • You are researching RAM for a computer you are building for a friend who will be using the system as a home office server for he
    14·1 answer
  • For drivers under 21, the penalties for driving with an illegal BAL include _____.
    5·2 answers
  • A news channel runs a two-minute story on phishing scams. The report features the testimonies of a phishing victim and a compute
    7·1 answer
  • As a digital forensics examiner, it’s a good idea to build a list of references for information on privacy laws in other countri
    13·1 answer
  • SHOW ALL YOUR WORK. REMEMBER THAT PROGRAM SEGMENTS ARE TO BE WRITTEN IN JAVA. Assume that the classes listed in the Java Quick R
    9·1 answer
  • During the name resolution process, which technique is used to avoid congestion when querying a server
    8·1 answer
  • Which statement is true about the purpose of a work in process constraint?
    15·1 answer
  • Which of these are characteristics of a Python data type? Check all that apply.
    11·1 answer
  • TQ Artificial Intelligence (AI)
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!