1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fantom [35]
3 years ago
8

Of the two basic methods of data entry, keyboards use keystrokes to enter data and instructions; what is the nonkeyboard method

called
Computers and Technology
1 answer:
MariettaO [177]3 years ago
5 0

Answer:

Source data entry

Explanation:

Example of Source data entry devices are scanning device, Audio/ Video device.

You might be interested in
A touch screen is classified as a special type of scanning device true or false
Arte-miy333 [17]
The anwser is true. It is special type


6 0
4 years ago
The five types of personal computers are: desktops, laptops, tablets, smartphones, and ________.
motikmotik

Answer:

B. Wearables.

Explanation:

These are tagged to be a category now in the technology as they are seen to make up the fifth type of personal computers in the question above. These are seen to be attached on the body or sometimes embedded to our outfit and also in other cases hung on a part of our body. They are counted to range from fitness trackers to smart watches, headsets etc. They are said to posses microprocessors which aid their functional ability through its use of the internet.

4 0
3 years ago
The intuitive interface designed by alan kay is called a ________.
juin [17]
GUI or Graphical User Interface
4 0
3 years ago
What can the tab key do
bulgar [2K]
Answer: it indents

Explanation:
8 0
3 years ago
Characteristics of VR headsets​
weeeeeb [17]
Answer Believable Virtual Word. The believable virtual world is a key characteristic of Virtual Reality. ...
Immersive. ...
Feedback. ...
Interactive. ...
Virtual Reality Headset. ...
Computing Device (Commuter / Smart Phone) ...
Virtual Reality Input and Output Devices. ...
Fully Immersive Virtual Reality.
5 0
3 years ago
Other questions:
  • Which of the following steps in enumeration penetration testing extracts information about encryption and hashing algorithms, au
    13·1 answer
  • Write a program that reads a 4-bit binary number from the keyboard as a string and then converts it into decimal. For example, i
    11·1 answer
  • 5. Create a vector called to20 that goes from 1 to 20 (use the range notation). Now create a variable called end that goes from
    9·1 answer
  • A virus that propagates using the internet or another computer network is called __________.
    10·1 answer
  • Which vpn protocol is a poor choice for high-performance networks with many hosts due to vulnerabilities in ms-chap?
    15·1 answer
  • Write an algorithm that receives a number from the user (you can store the number in a variable called N). Then the algorithm sh
    8·1 answer
  • Dummy activities A. are found in both AOA and AON networks. B. are used when two activities have identical starting and ending e
    9·2 answers
  • Que quiere decir analogico
    6·1 answer
  • The ____ contains app buttons that allow you to quickly run the File Explorer or Microsoft Edge apps.
    12·1 answer
  • What is required when opening a checking account?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!