Data items enter the computer system through ____ devices.

A. software
B. input
C. output
D. storage


Answer: B

Computer Science & Information Technology

You might also like to view...

Which of the following is not included in

a. pow. b. floor. c. ln. d. log.

Computer Science & Information Technology

A(n) ________ control is a control whose data source is a field in the table such as the customer name

Fill in the blank(s) with correct word

Computer Science & Information Technology

____ exploration is a valuable strategy that can be used by both system administrators and potential intruders for gathering information about a system and its infrastructure vulnerabilities.

A. One-sided B. Sequential C. Inferential D. Combinational

Computer Science & Information Technology

A(n) ____________________ chart is a chart placed on the same worksheet with the data.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology