1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Basile [38]
4 years ago
15

Select all examples of proper keyboarding technique.

Computers and Technology
2 answers:
slava [35]4 years ago
8 0

There are three answers to this.

The proper keyboarding technique includes:

Keep your eyes on the text you are typing

Aim to make no mistakes

Keep your hands slightly lower than your elbows.

emmasim [6.3K]4 years ago
4 0
Keep your eyes on the text and aim to make no mistakes
You might be interested in
The term technology is derived from the Chinese word. it is true or false​
DiKsa [7]

Answer:

True

Explanation:

it's your perfect answers

4 0
3 years ago
Read 2 more answers
What is a special character in passwords?
UNO [17]
A special character is what is the 2nd key of the numbers on the top of your keyboard. Such as @#$%^&*. These are all special characters. Hope this helped :)
7 0
4 years ago
True or false. two popular electronic image formats are pdf and xps.
kenny6666 [7]
False. You can use, for example, .jpg and .png file formats.
8 0
3 years ago
How to contact the school administrator? I have a very big problem with my school account I forgot password and Google keep sayi
Drupady [299]

Answer: you can contct with her email or call the school

Explanation:its just wht u do

3 0
3 years ago
How do you get The gold chip on Megaman x3 snes I want To know
strojnjashka [21]

Answer:

no clue lol

Explanation:

5 0
3 years ago
Other questions:
  • Which feature of Microsoft power point make tiles fly in on the clock of a mouse
    8·1 answer
  • What is meant by polling mode in communication between software andUART and what is its disadvantage as compared to interrupt mo
    14·1 answer
  • In basic network scanning, ICMP Echo Requests (type 8) are sent to host computers from the attacker, who waits for which type of
    14·1 answer
  • _____ are graphical representations that provide a command to the computer.
    12·2 answers
  • Why do bats sleep upside down
    7·1 answer
  • Which job role requires you to set up an internet system access
    10·1 answer
  • Here we have a program which is calling the subtract function to calculate the difference between two numbers. The value from th
    7·1 answer
  • when you enter a formula in a cell the result of the calculation displays in a cell. how do views of formula after entering it?
    9·2 answers
  • 9 Which of these words is used to begin a conditional statement? ​
    8·1 answer
  • What are a few ways to format the text in a mail message in Outlook? Check all that apply.
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!