1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitrij [34]
3 years ago
10

What is the other alternative keyboard to the qwerty?

Computers and Technology
2 answers:
AnnZ [28]3 years ago
6 0
Dvorak is an example.
There are also variations of Qwery like Qzerty, Qwertz, Azerty
gulaghasi [49]3 years ago
3 0

Dvorak.It Was An Qwerty ALT

You might be interested in
How do I change my username/display name
exis [7]

Answer:

.

Explanation:

you do to me on the bottom bar and once you hit that you click the pencil and change it

6 0
3 years ago
Read 2 more answers
4.5 code practice edhesive
Bezzdna [24]

Answer:

n= input("Please enter the next word: ")

x=1

while(n != "STOP"):

 print("#" + str(x) + ": You entered " + n)

  x=x+1

  n= input("Please enter the next word: ")

print("All done. " + str(x-1) + " words entered.")

Explanation:

8 0
3 years ago
______ is used to ensure that data is organized most efficiently in a database. A) Consistency checking. B) Validation C) Normal
Leya [2.2K]

Answer:

C) Normalization

Explanation:

Normalization is an approach that is to be done in a systematic manner in order to remove the data duplicity and there are non-desirable attributes such as insert, update, delete, etc. In this the process should be followed in multi step that contains the data in a tabular form so that it could eliminate the repetition of data to maintain the efficiency of the data

Therefore according to the given situation, the option C is correct

6 0
3 years ago
Whats the size of a short bond paper in microsoft word?
poizon [28]
I believe the size is 8.5x11
7 0
3 years ago
Your network administrator finds a virus in the network software. Fortunately,
Over [174]
B. vulnerability

It’s considered a vulnerability because the administration should have had security protections on the network.
8 0
3 years ago
Other questions:
  • What computer would be good for editing and streaming for less than 600$?
    7·1 answer
  • The wired or wireless means of connecting a computer to the internet is called a ________.
    9·1 answer
  • Write a function DrivingCost() with input parameters drivenMiles, milesPerGallon, and dollarsPerGallon, that returns the dollar
    12·1 answer
  • Write an SQL statement that uses all of the SQL built-in functions on the Quantity-OnHand column. Include meaningful column name
    14·1 answer
  • Do you think you should learn to program? Why? why not?
    11·1 answer
  • Keli is unable to find a shape that meets her needs. Which feature in Power Point should she use to create shapes that are compl
    6·1 answer
  • The science of how an object reacts to its motion through air is called _______________. (12 letters)
    13·2 answers
  • Question 1 of 10
    9·1 answer
  • Assuming a single-processor system, that load and store are atomic, that x is initialized to 0, and that x must be loaded into a
    8·1 answer
  • the advertisement below is an example of a(n) the advertisement below is an example of a(n) informative advertising objective pe
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!