A(n) ________ device is used to enter data into a computer

Fill in the blank(s) with correct word


input

Computer Science & Information Technology

You might also like to view...

The standardization of cryptographic protocols discourages attackers from trying to break them.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What are the disadvantages of converting a color image to black-and-white by converting it from RGB to Grayscale mode?

What will be an ideal response?

Computer Science & Information Technology

A container for code is called a ________

A) Sub procedure B) module C) function procedure D) Properties window

Computer Science & Information Technology

If Windows Defender finds a problem, it ____ the software, which prevents it from running.

A. defuses B. disarms C. conceals D. quarantines

Computer Science & Information Technology