1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mylen [45]
2 years ago
9

Discuss the various types of keys available on a computer keyboard.No spam answer needs!❌❌​

Computers and Technology
1 answer:
olga nikolaevna [1]2 years ago
3 0

Answer:• Alphanumeric keys – all of the letters and numbers on the keyboard. A-Z and 0-9.

• Punctuation keys – All of the keys associated with punctuation such as the comma,

period, semicolon, brackets, parenthesis and so on. Also, all of the mathematical

operators such as the plus sign, minus sign, and equal sign.

• Special keys – All of the other keys on the computer keyboard such as the function

keys, control keys, arrow keys, caps lock key, delete key, etc.

Special keys on a PC Keyboard

• Alt key – Short for Alternate, this key is like a second control key.

• Arrow Keys – Most keyboards have four arrow keys that enable you to move the

cursor (or insertion point) up, down, right, or left. Used in conjunction with the Shift

or Alt keys, the arrow keys can move the cursor more than one position at a time, but

this depends on which program is running.

• Backspace key – Deletes the character just to the left of the cursor (or insertion

point) and moves the cursor to that position.

• Caps Lock Key – A toggle key that, when activated, causes all alphabetic characters

to be uppercase.

• Ctrl key – Short for Control, this key is used in conjunction with other keys to

produce control characters. The meaning of each control character depends on which

program is running.

• Delete Key – Sometimes labeled Del, deletes the character at the current cursor

position, or the selected object, but does not move the cursor. For graphics-based

applications, the Delete key deleted the character to the right of the insertion point.

• Enter Key – Used to enter commands or to move the cursor to the beginning of the

next line. Sometimes labeled Return instead of Enter.

• Esc Key – Short for Escape, this key is used to send special codes to devices and to

exit (or escape) from programs and tasks.

• Function Keys – Special keys labeled F1 to F12. These keys have different meaning

depending on which program is running.

Explanation: use quillbot or wordtune to change the words

You might be interested in
Which of the following is an external hard drive
fredd [130]

Answer:

Question 1 = D

Explanation:

7 0
3 years ago
A hard disk is divided into tracks which are further subdivided into:​
marusya05 [52]

Answer:

sectors

Explanation:

hard disk contain tracks which are further divided into sectors, for storage purposes.

8 0
3 years ago
Describe how computer are used in ticket counter?​
m_a_m_a [10]

Answer:

These systems are commonly used in facilities such as public libraries to ensure equitable use of limited numbers of computers. Bookings may be done over the internet or within the library itself using a separate computer set up as a booking terminal.

6 0
3 years ago
What is one property of a good hash code?
larisa [96]

Answer:- Major property of a good hash code is that objects which are equal should return the same hash code .

Explanation: Hash codes is a numeric value which  is used for identify a object while a equality testing .Hash code can occupy the value of any length and then returns a fixed length value. The value of hash codes are variable.

If two objects are equal then by the method of equal(object) if the hashcode() function is called on both the objects , they produce the same value.

8 0
4 years ago
How many shared keys are required for a company of 70 employees who all need to communicate securely with each other?
kiruha [24]
I Think The Answer Would Be B Or D

7 0
3 years ago
Other questions:
  • Why has unicode become the standard way of converting binary to text
    7·1 answer
  • You are to create a program using Python that asks the user for a nonnegative number, then computes the mean and variance using
    15·1 answer
  • What the gas line in the car
    12·1 answer
  • If you create and invoke a recursive function without accounting for a base case, what can go wrong?
    15·1 answer
  • Suppose that a is declared as an int a[99]. Give the contents of the array after the following two statements are executed: for
    15·1 answer
  • I need 3 sentences on adware.<br> What they do and how they are a risk.
    5·1 answer
  • When backing up a database, what is added to the file name?<br> On g metrix
    9·1 answer
  • In the context of computer and network security, a security system is said to possess _____ when it does not allow data to be co
    13·1 answer
  • Insert in the Current Values section at the top of the worksheet summary functions that use the range I9:I54. In cell I2, calcul
    7·1 answer
  • The Quick Search capability is found on which control?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!