1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sammy [17]
3 years ago
9

What pointer appears when pointing to a hyperlink

Computers and Technology
2 answers:
Leokris [45]3 years ago
6 0
Your answer would be: a hand pointer.
fgiga [73]3 years ago
3 0

Answer: hand

Explanation: The hand pointer appears when pointing to a hyperlink, like that found in a help window displayed by the Tell Me box. When you click a link a browser window opens.

You might be interested in
What new deal programs were created to build dams to control flooding and generate electric power?
rewona [7]
<span>TVA (Tennessee Valley Authority).

</span><span>Recovery-1933 program created to provide jobs. Built dams in order to generate cheap electricity and control flooding in TN, GA, AL, and KY. Sparked controversy because companies that provided electricity would now have to compete with the government. Eliminated flooding, gave thousands electricity for the first time, improved transportation and forced 15,000 families to move.</span>
3 0
3 years ago
When talking about the physical elements of the internet, the term redundancy refers to:?
Sphinxa [80]
It refers to the physical elements of the internet
6 0
3 years ago
The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals
valkas [14]
Data compilation I believe
4 0
3 years ago
PLEASE HELP SOMEONE!!!!!!!!! WILL GIVE BRAINLIEST!!!!!!!!!!!!!!!!!!!!!!!!! Fill in the blanks.
olasank [31]
<span> change the behavior of the program I think</span>
7 0
3 years ago
________ is a process where authentication and permission will be passed on from one system to another, usually across multiple
hoa [83]

Answer: Federation

Explanation:

In multiple enterprises there are number of authentication processes to access resources and information so in order to avoid a large number of authentications we have a process called federation whereby all the authentication and authorization processes are passes from one system to the other within the enterprise.

3 0
3 years ago
Other questions:
  • Answer all 1).The most common layout of keys on the keyboard is the _____ keyboard. ASDF QWERTY JKL QWOPY,
    5·2 answers
  • Frank is a writer. He needs to work for long hours and type for long periods on the computer. What injury can Frank develop?
    15·2 answers
  • You can toggle between different types of references by pressing the ____ key on your keyboard.
    15·1 answer
  • Complexities of communication are organized into successive layers of protocols: lower-level layers are more specific to medium,
    8·1 answer
  • What are the useful techniques in program design?
    12·1 answer
  • Harold included an excerpt from an Internet magazine in an article he wrote for the school newspaper. However, he did not ask pe
    13·2 answers
  • Which of the following statements about electronic cover letters is true?
    14·2 answers
  • dam is writing a program that: 1) has the user guess a number, and 2) tells the user how many guesses it took to get the correct
    9·1 answer
  • Which interpersonal skill is the most important for a telecom technician to develop?
    7·1 answer
  • I’ll give brainliest if answers are correct
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!