1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sidana [21]
3 years ago
15

Select the proper ergonomic keyboarding techniques.

Computers and Technology
2 answers:
Firlakuza [10]3 years ago
7 0

Answer:

Your arms should be comfortable at your side, forming a 45° angle with your upper arms, and your forearms should be parallel to the floor.

Position the keyboard directly in front and close to you so you don't have an excessive reach.

If you are working for a long period of time, alternate between sitting and standing. Take breaks to stretch.

Keep your shoulders, arms, hands and fingers relaxed.

Position your wrists straight or in neutral position while typing.

Adjust your chair height and position so your feet rest flat on the floor, or add a footrest to compensate for a higher chair.

Adjust the keyboard height so that your shoulders can relax and your arms are straight in front of you.

ELEN [110]3 years ago
6 0

Keep the wrist in a neutral position: parallel to your desk and the middle finger must be in line with the wrist and forearm.

Don't rest your wrist while typing, let it float. Only rest your wrist while you are NOT typing.

Use a light touch when pressing keys.

Don't stretch your fingers to reach for faraway keys. Instead move your arm to position your finger over the key and then hit it.

Do not hold your thumbs rigid or your pinkies up. Curve your fingers.

Don't use two fingers of one hand for two-key combinations. Use one finger of one hand to hold Shift, Ctrl, or Alt down, and then hit the second key with a finger from the other hand. this is the way of typing :)

You might be interested in
Discuss the use of distributed (federated) authentication systems in use at your institution. If no such system is in use, then
aleksklad [387]

Answer:

Check the explanation

Explanation:

Distributed (federated) authentication system:

  1. • Federal identity in a information technology is a process of linking a person's identity and the attributes in multiple distinct identity management system.
  2. • It uses a single sign-on authentication; it means that one authentication credential is used to access multiple applications or the accounts.

Use of distributed (federated) authentication systems in institutions

In the institution the educational resources and other splices are offered via online, the faculty, students, alumni or other users using are accessing the resources from the various locations.

Different devices like mobile, tablet, laptop, desktop are used to access those resources.

The distributed or federated authentication identity management permits the institution to provide the access in a trustworthy, protected manner without n explosion a credentials.

• She distributed or federated authentication identity management permits the institution or individual faculty to control the access of research or other data easily and enables new level of academic collaboration

• It support the institutional policies to emend the access of valuable resources to a specific groups a use, and the incorporation of identity management across the academic government and commercial add and it make wider the possibility for interdisciplinary, inter-institutional scholarship.

BENEFITS

Students

• Make them to remember to single user id and password.

• Makes to access the educational resources across the institution and world.

• Personal information's are securely protected.

Teachers and Researchers

• flaps to create learning and research tools.

• It makes the control to access the restricted crown .

• It follows the Federal regulations and streamlines the access to the federal grant system

IT

• It eliminate the data and system redundancy

• Provides a strong and secure identity and access management.

4 0
3 years ago
My HTC Desire 510's mobile data stopped working, how to I make it work again?
denis-greek [22]
Ask your mobile operator
2.go to hrs service
3. Turn on and turn off
4 0
3 years ago
A computer is performing a binary search on the sorted list of 7 numbers below.
suter [353]

Answer:

The answer is "Option D".

Explanation:

Binary search is also an efficient mechanism for only a sorted item list. It separates the element into one half of the checklist repeatedly, till you have narrowed it down to the only single place.

In this search, the number of comparisons is much more efficient than in the series to use the binary search approach, the items also should be shown, that's why the last choice is correct.

6 0
3 years ago
Read 2 more answers
Write a python program to print the following series 3..10..31..94......n​<br><br>Pls answer fast..
butalik [34]

I've included my code in the picture below. Best of luck

8 0
3 years ago
Select the correct category of cybersecurity described.
Shalnov [3]

Answer:

Network security

Explanation:

Network security is a category of cybersecurity that is related to the protection of the infrastructure of the computer network from unauthorized access and intrusion that may be from intended attack or from an expedient  program which may result in the modification, malfunctioning, misuse or unacceptable disclosure of the network and the contents of the network

The category of cybersecurity that 'prevents intruders from accessing, misusing, destroying, adapting, or improperly disclosing networks, network infrastructure, or the information contained within networks' is network security.

6 0
2 years ago
Other questions:
  • A(n) ____________ is a program that translates a high-level language program into a separate machine language program.
    7·1 answer
  • Write the following function without using the C++ string class or any functions in the standard library, including strlen(). Yo
    12·1 answer
  • When pasting information copied from a Word document into an Excel spreadsheet, click in the cell that will be the _______ of th
    7·2 answers
  • When evaluating mining results, data mining and evaluating becomes
    6·1 answer
  • A Unit of information containing the objects position, rotation, and scale values is called:
    13·1 answer
  • What cannot be performed using windows task manager
    10·1 answer
  • Which one is the correct answer
    13·1 answer
  • To check spelling errors in a document, the Word application uses the _____ to determine appropriate spelling.
    7·2 answers
  • Which window would show you bindings for local area connection 2?
    5·1 answer
  • Data becomes _______ when it is presented in a format that people can understand and use.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!