1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
N76 [4]
3 years ago
7

Of the two basic methods of data entry, keyboards use keystrokes to enter data and instructions; what is the nonkeyboard method

called? twain pointing-device entry source data entry digitized entry
Computers and Technology
1 answer:
Sergio [31]3 years ago
4 0
The correct answer of the given question above would be second option: SOURCE DATA ENTRY. <span>Of the two basic methods of data entry, keyboards use keystrokes to enter data and instructions; the non keyboard method is called the source data entry.</span>
You might be interested in
What is the relationship between ionic bonds and cleavage
Marrrta [24]
Hello there!

The relationship between ionic bonds and cleavage is: As the ionic bond strength increases, cleavage will be more difficult. 

Minerals are held together generally by ionic bonds. Ionic bonds are the result of electrostatic attraction and electron transfer between positive and negative ions (cations and anions). Ionic bonding implies the formation of ordered crystalline solids and the cleavage of those solids will depend on the strength of this bonding. 
7 0
3 years ago
Mention 3 components that can be found at the back and front of the system unit​
Radda [10]

Answer:

<u>Back</u>

Power port, USB port, Game port

<u>Front</u>

Power button, USB port, Audio outlet

Explanation:

There are several components that can be found on the system unit.

In most (if not all) computer system units, you will find more component at the back side than the front side.

Some of the components that can be found at the back are:

Ports for peripherals such as the keyboard, mouse, monitor, USB ports, power port, etc.

Some of the components that can be found at the back are:

The power button, cd rom, audio usb ports, several audio outlets, video port, parallel ports, etc.

Note that there are more components on the system units. The listed ones are just a fraction of the whole components

3 0
3 years ago
Brainlist will be added!✴
Bess [88]

You can transfer this file by inserting your USB or Lightening Cable into the computer's USB Port, then you go into the Computer Window on the computer and find your device and then look for the file in it's specific folder!

5 0
3 years ago
Your company has a team of remote workers that need to use Windows-based software to develop company applications, but your team
timofeeve [1]

Operating systems are the software that supports the basic functioning of the computer. Windows Virtual Desktop is an Azure compute service that will help solve the problem.

<h3>What is Windows Virtual Desktop?</h3>

Windows Virtual Desktop is an app virtualization service of Azure that operates on the cloud platform. It includes standard operating procedures that can be used by users with multiple OS.

Azure's Virtual Desktop supports different versions of window OS. This type of system is majorly used in remote work demands and specialized workloads.

Therefore, Windows Virtual Desktop is an Azure compute service.

Learn more about Azures service here:

brainly.com/question/13144160

#SPJ1

5 0
2 years ago
What are two preferences a user can indicate for the Junk Email folder?
marysya [2.9K]
Did you mean this?
<span>Controls are divided between two locations: (a) </span>Tools -> Options<span> -> Security -> Junk, and (b) Tools -> Account Settings -> *each account* -> Junk Settings.</span>
5 0
3 years ago
Read 2 more answers
Other questions:
  • Which program or security application prevents access between a private and trusted network, and other untrusted networks?
    8·2 answers
  • manufacturers are making an effort to build energy-efficient computers and use recyclable cases and packaging true or false
    10·1 answer
  • Radar devices are used by law enforcement to be sure that individuals are driving safely. They tell the officer how fast the veh
    12·1 answer
  • Apex
    5·2 answers
  • 1)Create a conditional expression that evaluates to string "negative" if userVal is less than 0, and "positive" otherwise. Examp
    15·2 answers
  • The Last Free brainliest<br><br> This Is The Last Brainliest That Im Doing Forever Sorry Guys
    8·2 answers
  • Virus program do not replicate themselves true or false one word answer only​
    15·2 answers
  • A printer is considered to be in the category of
    5·2 answers
  • Explain any two types of board band connection​
    11·1 answer
  • A malicious actor is preparing a script to run with an excel spreadsheet as soon as the target opens the file. the script includ
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!