1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Basile [38]
4 years ago
15

Select all examples of proper keyboarding technique.

Computers and Technology
2 answers:
slava [35]4 years ago
8 0

There are three answers to this.

The proper keyboarding technique includes:

Keep your eyes on the text you are typing

Aim to make no mistakes

Keep your hands slightly lower than your elbows.

emmasim [6.3K]4 years ago
4 0
Keep your eyes on the text and aim to make no mistakes
You might be interested in
Which type of computer is the fastest?
yawa3891 [41]
Supercomputer because they are like hundreds of computers in one they also use them at NASA and stuff
7 0
3 years ago
Give four example of computer virus​
asambeis [7]

trojan virus allows some one to sneak a bunch of coruppted data or more viruses into a system. a worm is able to access some ones computer and steal information a firebug is used to crash someones computer and spyder is used to scramble some ones work and deleting it

6 0
3 years ago
Which term describes an approach to security similar to defense in depth in that it supports multiple layers, but uses a differe
miss Akunina [59]

Answer:

The answer to this question is Diversity of Defense.

Explanation:

Diversity of defense:- It is an approach for security which supports multiple layers but the catch here is that at each layer a different mechanism of security is used or at most of the layers.The idea is that you do not need to have multiple layers of defense but different defenses also.  

So we conclude that the answer to this question is Diversity in Defense.

3 0
3 years ago
What happen if there is no authentication??
creativ13 [48]

Answer:

anyone could access something and hack others

Explanation:

7 0
3 years ago
Read 2 more answers
The intersection of a row and a column is commonly called what?
Ierofanga [76]
I dont know the answer sorry i just need the points
6 0
3 years ago
Other questions:
  • ________ software provides a means of sharing, distributing, and searching through documents by converting them into a format th
    13·1 answer
  • Create a class called Toddler that inherits from a class called Parent. (Note that Parent has already been defined elsewhere, so
    8·2 answers
  • Which of the following might not exist in a URL?
    10·2 answers
  • Which organization has published more than 300 web standards
    7·1 answer
  • Employers and recruiters rarely use the Internet to search for personal details about applicants.
    9·1 answer
  • In IDLE, which symbols are used for the prompt? <br>*** <br>&lt;&lt;&lt;<br> &gt;&gt;&gt;<br> ---​
    8·1 answer
  • Explain what is meant by information technology (IT). Explain what is meant by information systems (IS). Why is it important to
    7·1 answer
  • TABLE TEST
    12·1 answer
  • Modern Computers compared to earlier computers are
    10·1 answer
  • Which type of internet connection allows for high-speed bi-directional data communication over a hybrid fiber-coaxial (HFC) conn
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!