Question

peripheral devices are suitable for communicating with the computer user. Memory Machine readable Communication Human readabl
0 0
Add a comment Improve this question Transcribed image text
Answer #1

Option D is correct which are Human readable

Human readable peripheral devices are suitable for communication with the computer user

Memory is not correct because it was used for the store the data so it was not correct

Machine readable is related to equipment so it was not correct

Communcation which is related to remote devices so it was not correct

so based on that option D is correct which is Human readable

#if you have any doubt or more information needed comment below..i will respond as possible as soon..thanks....

Add a comment
Know the answer?
Add Answer to:
peripheral devices are suitable for communicating with the computer user. Memory Machine readable Communication Human readable
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Comet Computer Company, a manufacturer of computers and peripheral devices, purchases computer parts such as motherboards,...

    Comet Computer Company, a manufacturer of computers and peripheral devices, purchases computer parts such as motherboards, computer chips, hard drives, and displays, and then assembles these parts into a variety of non-customized devices, such as tablet computers, laptops, and desktop computers. Comet’s products are available in limited regional distribution. Which type of production process is most likely used by Comet Computer Company? Choices: 1. Continuous Flow. 2. None of these answers is correct. 3.Job Shop. 4.Assembly. 5.Batch.

  • Group B Word Pool IL. A computer application that allows the user to enter demographic information,...

    Group B Word Pool IL. A computer application that allows the user to enter demographic information, schedule appointments, maintain lists of computer network data server local area network dumb terminal. insurance payers, perform billing tasks, and generate reports 12 Asystem that links personal computers and peripheral devices to share information and resources router practice management software redundancy Ethernet wide area network 13. Peripheral computer hardware that connects to the router to provide Internet access to the network or computer modem...

  • Vocabulary Exercises is the communication channel that connects all computer system components Cache types that are...

    Vocabulary Exercises is the communication channel that connects all computer system components Cache types that are generally implemented on the same chip as the CPU include 3. thus controlling access to the bus by all other The CPU is always capable of being a(a) devices in the computer system. 4. An) is a reserved area of memory used to resolve differences in data transfer rate or data transfer unit size. 5. A(n) is an area of fast memory where data...

  • Question 10 Communication of data in binary code from one computer to another A. Graphical User...

    Question 10 Communication of data in binary code from one computer to another A. Graphical User Interface (GUI) B. Outsourcing c Electronic Data Interchange (EDI) D Remote Access A Moving to another question will save this response.

  • Sales Variances Assume that Casio Computer Company, LTD. sells handheld communication devices for $150 during August...

    Sales Variances Assume that Casio Computer Company, LTD. sells handheld communication devices for $150 during August as a back-to-school special. The normal selling price is $225. The standard variable cost for each device is $95. Sales for August had been budgeted for 400,000 units nationwide; however, due to the slowdown in the economy, sales were only 375,000. Compute the revenue, sales price, sales volume, and net sales volume variances.

  • computer architecture Virtual memory 4 physice memar Assume a 64 bit machine with 40 bit addresses,...

    computer architecture Virtual memory 4 physice memar Assume a 64 bit machine with 40 bit addresses, and 16GB of actual memory. Memory blocks are 4K 1. How many bits in the virtual memory INDEX and OFFSET fields? 2. What fields do you need in a page table entry, and how many bits are needed for each? How many bytes do you need for each page table entry? (each entry is allocated in a whole number of bytes, even if there...

  • Noen CETTE Group C 21. An electronic record of health-rela an individual that can be created...

    Noen CETTE Group C 21. An electronic record of health-rela an individual that can be created and accessed by authorized clinicia within a single healthcare organization web-related information about created, gathered, managed, d clinicians and staff members ganization, also called EMR 22. The computer process of changing encrypted text after a user enters a secret key or password encrypted text to readable or plain text after a user enters 23. Requirements established by the Centers for Medica Medicaid Services (CMS)...

  • chpater 7&8 Designing the user interface: strategies for effective human-computer interaction (textbook) 1.An airline company is...

    chpater 7&8 Designing the user interface: strategies for effective human-computer interaction (textbook) 1.An airline company is designing a new on-line reservation system. They want to add some direct-manipulation features. For example, they would like customers to click a map to specify the departure cities and the destinations, and to click on the calendar to indicate their schedules. From your point of view, list four benefits and four problems of the new idea compared with their old system, which required the...

  • Write the code in C language. Computer communication networks sometimes have noise on them, which can...

    Write the code in C language. Computer communication networks sometimes have noise on them, which can corrupt data being transmitted. It is the responsibility of the computers communicating to confirm data is transmitted accurately. One method to do this is to calculate a checksum of the data and transmit the checksum along with the data to ensure accuracy. In C, we can compute a checksum simply by summing the integer ASCII codes in the message and finding the remainder of...

  • Multiple Choice 11. The ________ is the agreed-upon interface between all the software that runs on...

    Multiple Choice 11. The ________ is the agreed-upon interface between all the software that runs on the machine and the hardware that executes it. It allows you to talk to the machine. A) hardware protocol B) software protocol C) machine control architecture D) instruction set architecture 12. A ________ consists of an arithmetic logic unit and a control unit. A) processor B) computer C) register D) program 13. ________ are typically used by companies for specific applications such as data...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT