A computer consists of various devices referred to as ________ (e.g., the keyboard, screen, mouse, hard disks, memory, DVD drives and processing units).

a. objects
b. software
c. hardware
d. groupware


c. hardware

Computer Science & Information Technology

You might also like to view...

Consider the code segment below. Which of the following statements is false?

``` int[] g; g = new int[23]; ``` a. The value of g[3] is -1. b. The first statement declares an array reference. c. The second statement creates the array. d. g is a reference to an array of integers.

Computer Science & Information Technology

Which of the following is a snippet of code designed to automate tasks and often used by attackers to carry out a denial-of-service attacks?

A. Ransomware B. Screen scraper C. Zero-day exploit D. Bot

Computer Science & Information Technology

A URL is used to __________.

a. identify the location of any Web b. begin the browser c. access applications on your desktop d. access the browser on the desktop

Computer Science & Information Technology

The length of an array is one more than the maximum subscript number.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology