1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
N76 [4]
3 years ago
7

Of the two basic methods of data entry, keyboards use keystrokes to enter data and instructions; what is the nonkeyboard method

called? twain pointing-device entry source data entry digitized entry
Computers and Technology
1 answer:
Sergio [31]3 years ago
4 0
The correct answer of the given question above would be second option: SOURCE DATA ENTRY. <span>Of the two basic methods of data entry, keyboards use keystrokes to enter data and instructions; the non keyboard method is called the source data entry.</span>
You might be interested in
Explain the quality-improvement process.
Tasya [4]

Answer:

 The quality improvement is the process that involve the complete organization in pursuit of the quality. It basically helps to improve the team knowledge and in decision making by using the validate data.  

The quality improvement is the proactive undertaking of recognizing, breaking down and enhancing existing business forms inside an association for enhancement and to satisfy new portions or guidelines of value.

 The main factors of the quality improvement are:

  • Leadership quality
  • Monitoring various types of systems
  • High availability of resources
  • Adequate infrastructure

3 0
3 years ago
Read 2 more answers
How does the Lossy file format reduce the file size?
beks73 [17]

The answer is c. I just took it on apex n that’s what I got lol

3 0
3 years ago
Read 2 more answers
When you add text to a slide using presentation software, which of the following is important?
katrin [286]
I think the answer is B. The text should be brief. 
7 0
3 years ago
Read 2 more answers
Which CSS property configures the font typeface?
Vitek1552 [10]
The answer to this is font-family.
Example of usage:
```
<em>#headerFont{</em>
<em>   font-family: Times New Roman;</em>
<em>}
</em>
```
You can put your font name in quotes <em>(eg: "Ariel")</em> but it's not always necessary- but it is a good practice to get into because it helps to avoid certain fonts not being able to show up. Please note there are some fonts that will not work in certain browsers.

   If you choose a custom font ether you made or you downloaded, unless you have the font itself saved into your code, unless the user has that font on their end, they will <em>not</em> see it- this is where backup fonts are helpful until or using universal ones; at least until you learn how to integrate the font fully into your website.
5 0
3 years ago
Which data type requires the greatest number of bytes in computer memory?
xxMikexx [17]

Answer:

Double precision number

Explanation:

The IEEE has given some Standards for representing numbers

IEEE Standards for floating point numbers is common convention for representing numbers in binary on Computers.

Double precision number format takes up 64 bits.

Single precision number format takes up 32 bits

4 0
3 years ago
Other questions:
  • For any element in keysList with a value greater than 50, print the corresponding value in itemsList, followed by a space. Ex: I
    8·1 answer
  • Graphic design has evolved rapidly in recent years with the advancement of digital technology. Discuss how the evolution of grap
    8·1 answer
  • What percentage of jobs work in the entertainment industry?
    13·1 answer
  • Ports on the motherboard can be disabled or enabled in ____ setup. RAM Firmware Northbridge BIOS
    8·1 answer
  • 3.24 LAB: Seasons
    13·1 answer
  • A person appreciation of a food taste and flavor is commonly referred to as what
    14·1 answer
  • Modify the program you wrote for Chapter 6 Exercise 6 so it handles the following
    15·1 answer
  • Susan is a network monitoring technician working on a firewall for her company’s network. In the process to determine an open po
    8·1 answer
  • Read each of the following statements about Computer Science and explain why you think that statement is true.
    9·1 answer
  • What wireless security technology contains significant flaws and should never be used?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!