What is the primary input device of a computer?

A. monitor
B. keyboard
C. mouse
D. speakers


Ans: B. keyboard

Computer Science & Information Technology

You might also like to view...

Hiding an object, such as a diary, to prevent others from finding it is an example

A. trust B. cryptography C. Security through Obscurity D. transposition

Computer Science & Information Technology

____________________ injections are attacks made with little to no knowledge of the system.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

You use the Style Pane Options dialog box to change how styles display in the Styles pane

Indicate whether the statement is true or false

Computer Science & Information Technology

When you include table names in a structure reference it is called a(n) ________ structured reference

Fill in the blank(s) with correct word

Computer Science & Information Technology