1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GaryK [48]
2 years ago
11

What are the uses of navigation keys​

Computers and Technology
1 answer:
Zolol [24]2 years ago
3 0
The navigation keys allow you to move the cursor, move around in documents and webpages, and edit text.
You might be interested in
18) choose which article title would most likely be described by the database subject headings victims of famine, ireland, histo
Lunna [17]
I think the correct answer from the choices listed above is option B. The <span>article title that would most likely be described by the database subject headings victims of famine, ireland, history would be </span><span>''how many irish potato famine deaths? towards coherence of the evidence" Hope this answers the question.</span>
5 0
3 years ago
Which of the following is important to do when downloading a game to your
Anestetic [448]

Answer: (A) Check the vendors website to see if your model of phone and OS are listed as  supporting this game

Explanation:

  When we downloading a game in our smartphones we should check the vendor website that whether the phone model and the operating system supported the game. The smartphone is the type of the cellular telephone that contain integrated computer.

So, different types of smartphones model contain different types of operating system support. For example, the apple is the only type of vendor which build its own type of operating system and iPhone.

Therefore, Option (A) is correct.

3 0
3 years ago
Which of the following operations are considered to be crucial tasks that should be performed before installing server roles and
Bas_tet [7]

Answer:

A. Static IP address have been configured.

Explanation:

A network is an interconnection of network devices for communication to occur. A network comprises of end devices and intermediate network devices.

End devices are the sources and destinations of data transmission, while intermediate devices are the devices that makes communication of data possible like routers and switches. Examples of end devices are servers and workstations (computers, smartphones etc.).

A server in a network is a device that provides special services to workstations or clients. The IP addresses of servers must be known, that is, a static IP address must be configured on a server. Examples of server protocols are DNS, TFTP, FTP, DHCP etc.

8 0
3 years ago
4. What is the formula for calculating the file size?
Verizon [17]
Step 2: Multiply total number of pixels by the bit depth of the detector (16 bit, 14 bit etc.) to get the total number of bits of data. Step 3: Dividing the total number of bits by 8 equals the file size in bytes. Step 4: Divide the number of bytes by 1024 to get the file size in kilobytes.
7 0
3 years ago
Picture related to cyber safety
Fantom [35]

Answer:

?????

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • What daily life problems does the algorithm quicksort solve?
    14·1 answer
  • Which scientific law states that if a light source radiates isotropically, the light intensity falls off the further you get fro
    5·1 answer
  • Write a paragraph on the following topic.
    14·1 answer
  • Identify which statement explains why a programmer would break a logic problem into steps.
    13·2 answers
  • Calculate the total and average number from 1 to 100<br>​
    12·1 answer
  • Fill in the blanks: The _____ is useful for predicting future results. A. mean. B.median. C.mode
    15·1 answer
  • A total stranger is trolling Jack online. He’s offended and annoyed. How can Jack stop the troll in his or her tracks? (5 points
    10·2 answers
  • PLEASE I NEED HELP FAST
    8·1 answer
  • Robert is risk manager at TPT Bank has been asked to implement an updated badge reader system for addressing access control risk
    8·1 answer
  • Which of these are characteristics of a Python data type? Check all that apply.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!