1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AysviL [449]
2 years ago
6

List four commonly point and draw device​

Computers and Technology
1 answer:
Andreyy892 years ago
3 0

Explanation:

any four commonly point and draw device are:

1)mouse

2)joystick

3)trackball

4)pointing stick

You might be interested in
Why aren’t white Wall auto tires as wide as they used to be?or why do most cars not have them at all?
Ivanshal [37]
Expence pretty much.

8 0
4 years ago
Finish the program by choosing the correct terms.
juin [17]
What are the exact numbers
6 0
3 years ago
Read 2 more answers
Jim maintains attendance records for his employees for the year. Row B includes the dates of attendance, and column A includes t
ahrayia [7]
To lock multiple rows (starting with row 1), select the row below the last row you want frozen, choose the View tab, and then click Freeze Panes. To lock multiple columns, select the column to the right of the last column you want frozen, choose the View tab, and then click Freeze Panes<span>.


I hope my answer has come to your help. Thank you for posting your question here in Brainly. We hope to answer more of your questions and inquiries soon. Have a nice day ahead!
</span>
4 0
4 years ago
Read 2 more answers
What lets you change the order of events in a game?
IRISSAK [1]
B the story board editor.
8 0
3 years ago
Kiko loves to surf the internet and check on different websites. One day he received an email from unknown source. When he opens
Angelina_Jolie [31]

He experienced phishing

Phishing is a method of trying to gather personal information using deceptive e-mails and websites.

Here are some measures to avoid phishing. You can pick up the one you liked the most

  • Always check the spelling of the URLs in email links before you click or enter sensitive information
  • Watch out for URL redirects, where you're subtly sent to a different website with identical design
  • If you receive an email from a source you know but it seems suspicious, contact that source with a new email, rather than just hitting reply.
  • Don't post personal data, like your birthday, vacation plans, or your address or phone number, publicly on social media
5 0
3 years ago
Other questions:
  • How do productivity programs most benefit the way we work and live?
    15·1 answer
  • At the Network layer, what type of address is used to identify the receiving host?
    10·1 answer
  • Which of the following are reasons why it is important to properly recycle electronic equipment? Select all that apply.
    14·2 answers
  • Which statement accurately compares the restart at 1 and continue numbering featured of word
    15·2 answers
  • Eugenia told her coach that she was too tired to play. As soon as she said it, she realized that she had made a big mistake. She
    12·1 answer
  • Which should be your first choice for the most efficient and successful job search method?
    10·1 answer
  • How dependent are we on technology? ​
    15·2 answers
  • Unchecked exceptions require you surround the code that might throw such an exception with a try block or you must use a throws
    5·1 answer
  • True or false: Because there are so many different network configurations, operating systems, and strategies, it is a challenge
    14·1 answer
  • The top-level domain (tld), also known as the ________, typically identifies the type of organization an address is associated w
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!