1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sidana [21]
3 years ago
15

Select the proper ergonomic keyboarding techniques.

Computers and Technology
2 answers:
Firlakuza [10]3 years ago
7 0

Answer:

Your arms should be comfortable at your side, forming a 45° angle with your upper arms, and your forearms should be parallel to the floor.

Position the keyboard directly in front and close to you so you don't have an excessive reach.

If you are working for a long period of time, alternate between sitting and standing. Take breaks to stretch.

Keep your shoulders, arms, hands and fingers relaxed.

Position your wrists straight or in neutral position while typing.

Adjust your chair height and position so your feet rest flat on the floor, or add a footrest to compensate for a higher chair.

Adjust the keyboard height so that your shoulders can relax and your arms are straight in front of you.

ELEN [110]3 years ago
6 0

Keep the wrist in a neutral position: parallel to your desk and the middle finger must be in line with the wrist and forearm.

Don't rest your wrist while typing, let it float. Only rest your wrist while you are NOT typing.

Use a light touch when pressing keys.

Don't stretch your fingers to reach for faraway keys. Instead move your arm to position your finger over the key and then hit it.

Do not hold your thumbs rigid or your pinkies up. Curve your fingers.

Don't use two fingers of one hand for two-key combinations. Use one finger of one hand to hold Shift, Ctrl, or Alt down, and then hit the second key with a finger from the other hand. this is the way of typing :)

You might be interested in
Care should be taken whenever you post comments or photos to any social media or other websites, because each of these online ac
REY [17]

Answer:

True

Explanation:

Building your personal brand requires extreme care when it comes to social media presence. In the age of internet there is nothing hidden, so whatever you post or comment will be seen by your audience and it can go in either way. It can either make your brand or break it. It is of utmost importance to leave a pleasant and positive impact on your audience. One should not indulge in inappropriate or controversial debates and try to avoid being too personal on social media.  

6 0
3 years ago
A raised dot (ú) shows where the ENTER key was pressed. <br> a. True<br> b. False
MatroZZZ [7]
Its false nothing comes up when u press that key
5 0
3 years ago
An administrator helps a user obtain an Internet connection through connecting a laptop with a smartphone via a cable. What has
frez [133]
The administrator set up tethering
8 0
2 years ago
What is the best file manager for windows 10?
SOVA2 [1]

In my opinion, XYplorer is the best

7 0
2 years ago
Read 2 more answers
Brian’s father drives a car that uses voice commands for navigation. Which AI application field is Brian’s father using?
sergeinik [125]

Answer:

Linguistics.

Explanation:

It is  the scientific study of language and its structure, including the study of morphology, syntax, phonetics, and semantics. Specific branches of linguistics include sociolinguistics, dialectology, psycholinguistics, computational linguistics, historical-comparative linguistics, and applied linguistics.

Please mark as Brainliest! :)

6 0
2 years ago
Other questions:
  • To save a new copy of an existing database, a user can open the original database and select ________ from the file tab.
    8·1 answer
  • Which of the following is a trademark automatically received by an organization when a symbol is being consistently used in the
    13·1 answer
  • Which of the following is the MOST important consideration when planning your budget?
    15·2 answers
  • Caches are important to providing a high-performance memory hierarchy to processors. Below is a list of 32-bits memory address r
    9·1 answer
  • What do we call the two parts of lift that goes down a mine
    7·2 answers
  • We can sort a given set of n numbers by first building a binary search tree containing these numbers (using Tree-Insert repeated
    12·1 answer
  • Translation of a file into a coded Format that occupies less space than the original file is called
    6·1 answer
  • Discuss two business information systems that are used in two different sectors in a modern economy.
    11·1 answer
  • Write a C++ function for the following:
    14·1 answer
  • Meta is a penetration testing engineer assigned to pen test the security firm's network. So far, she cannot tunnel through the n
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!