What does I/O mean in computing​

Answers

Answer 1
Answer:

Explanation:

I/O (input/output)" describes any operation, program, or device that transfers data to or from a computer


Related Questions

Which of the following is NOT a typical action of the catch block?Select one:a. Throwing the exceptionb. Completely handling the exceptionc. Rethrowing the same exception for the calling environmentd. Partially processing of the exception
If you have a list consisting of just numbers, then you can add all of the values in the list using the sum() function. If your list consists of some numbers and some values of other types (e.g., lists, strings, sets), the sum() function will fail. In this question, we're asking you to write a function that will sum all of the numbers in a list, ignoring the non-numbers. The function below takes one parameter: a list of values (value_list) of various types. The recommended approach for this: (1) create a variable to hold the current sum and initialize it to zero, (2) use a for loop to process each element of the list, (3) test each element to see if it is an integer or a float, and, if so, add its value to the current sum, (4) return the sum at the end. student.py 1 Hef sum_lengths(value_list): # Implement your function here. Be sure to indent your code block! Restore original file
Describe how a web browser and web server work together to send a web page to a user
What type of result does the MATCH function, when used on its own, return?
What is the earliest version of the present day Internet?

What are keyboards that include all the keys found on a typical virtual keyboard, as well as extra keys, such as function and navigation keys

Answers

The keyboards that include all the keys found on a typical virtual keyboard including function and navigation keys are called;

Laptops

  • A virtual keyboard is one that appears only when we require it and then goes away after we are done using it. Due to the nature of them, they occupy a small space. Examples of these virtual keyboards are the keyboards in touch screen mobile phones as well as tablets. Also, there are some computer operating systems that support virtual keyboards such as Windows 10.

  • Now, it is pertinent to know that virtual keyboards don'trequire physical keys to operate and also they don't possess the function and navigation keys that traditional keyboards have.

  • The only other unit that has a keyboard that possesses the function and navigation keys are Laptops.

Read more at; https://brainly.in/question/11722276

Answer:

multimedia keyboard i think

Explanation:

Give a non-network example of hierarchical addressing and discuss how it reduces the amount of work needed in physical delivery. Do not use the postal service, or the telephone network..

Answers

HIERARCHICAL EXAMPLE.

Many examples of hierarchical addressing exists which reduces the amount of work needed in locating or in delivering,and one of such examples is the 'sorting of books in a library'.

Looking at a library having books kept randomly on any stack and shelf,it will make it difficult finding any book easily or locating any book of a specific genre.so,to avoid such problems, books are orderly sorted in a library and each book is given or has a unique identification number.

Books that has the same or related subject are kept in the same stack and books of the same genre are also kept together.

In a library,there are many stacks having different rows.

Take for an example; If one need to find a book on computer network,the user can search for the books in stacks of books that are related to Computer Science instead of searching the whole library for the book.

So,the hierarchical addressing saves lots of work and also time required for searching a specific book in the library.

Which key do programmers use to end running programs?Num Lock
Scroll Lock
Pause/Break
Backspace

Answers

I would answer backspace because i had some experience with that
Pause/Break   i would say

What is the largest safety threat to the ISS?
Will give brainlest :)

Answers

Answer:

The largest safety threat to the ISS are the micrometeorite and orbital debris (MMOD) fires, impacts and toxic spills. These pose the biggest threat to the ISS astronauts.

Explanation:

The debris is as a result of collisions. An observation revealed that once a certain mass is passed, collisions give rise to more debris.

Another report revealed that the station has about 55% chance of being hit by tiny space rocks over a 10-year period. They can protected by installing new impact-protecting panels to the exterior of the station.

ISS means International Satellite Station.

Create an application named ArithmeticMethods whose main() method holds two integer variables. Assign values to the variables. In turn, pass each value to methods named displayNumberPlus10(), displayNumberPlus100(), and displayNumberPlus1000(). Create each method to perform the task its name implies. Save the application as ArithmeticMethods.java.

Answers

Answer:

public class ArithmeticMethods

{

public static void main(String[] args) {

    int number1 = 7;

    int number2 = 28;

 displayNumberPlus10(number1);

 displayNumberPlus10(number2);

 displayNumberPlus100(number1);

 displayNumberPlus100(number2);

 displayNumberPlus1000(number1);

 displayNumberPlus1000(number2);

}

public static void displayNumberPlus10(int number){

    System.out.println(number + 10);

}

public static void displayNumberPlus100(int number){

    System.out.println(number + 100);

}

public static void displayNumberPlus1000(int number){

    System.out.println(number + 1000);

}

}

Explanation:

Inside the main:

Initialize two integers, number1 and number2

Call the methods with each integer

Create a method called displayNumberPlus10() that displays the sum of the given number and 10

Create a method called displayNumberPlus100() that displays the sum of the given number and 100

Create a method called displayNumberPlus1000() that displays the sum of the given number and 1000

What types of messages flow across an SDN controller’s northbound and southbound APIs? Who is the recipient of these messages sent from the controller across the southbound interface, and who sends messages to the controller across the northbound interface?

Answers

The types of messages which flow across an SDN controller northbound and southbound APIs are:

  • Messages that helps to develop flow tables
  • Messages that helps to interact between the controller and network control applications
  • Messages which help for the up-to-date view of the network's state, etc.

The recipient of these messages sent from the controller across the southbound interface, and who sends messages to the controller across the northbound interface are:

  • Controlled devices are the recipient
  • Network control applications send the messages

What is Communication?

This refers to the exchange of information between different people or computers using a medium which also gives feedback.

Read more about communication here:
brainly.com/question/25793182

Answer and Explanation:

Messages flow across an SDN controller's:  

Northbound APIs:  

• Messages which help in read/write state of the network and developing flow tables within the  

state management layer.  

• Notifications for the state-change events.  

• The interaction between the controller and network control applications is done through the  

northbound interface.  

• Network control applications send messages to the controller.  

Southbound APIs:  

• Messages which help for the up-to-date view of the network's state like message for the  

attached link has gone up or down, new devices are joined the network, or indications of the  

device is up or down.  

• Controller's southbound interface is the communication among the controller and the controlled  

devices. Controlled devices are the recipients of the messages sent form the controller.