1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Effectus [21]
3 years ago
8

What is the term for the typical layout of the keys on a keyboard?

Computers and Technology
2 answers:
amid [387]3 years ago
4 0
The answer is B)
It’s the first 6 letters on the top of the letter keyboard
stepan [7]3 years ago
3 0
I think the answer is B
You might be interested in
The term “computer literacy” dates back to what decade? <br> 1960s<br> 1970s<br> 1980s<br> 1990s
NNADVOKAT [17]
1970-80s which is when some of the first computers were created like apple computers which looked like a giant cube and a rectangle on the side which is very different than what we have today.

Hope this helps!
3 0
3 years ago
Write a program that asks the user to enter a series of single digit numbers with nothing separating them. Read the input as a C
vladimir2022 [97]

Answer:

#include <stdio.h>

#include <string.h>

int main(){

   char number[100];

   printf("Number: ");

   scanf("%s", number);

   int sum = 0;

   for(int i =0;i<strlen(number);i++){

       sum+= number[i] - '0';

   }

           printf("Sum: %d",sum);

   return 0;

}

Explanation:

This declares a c string of 100 characters

   char number[100];

This prompts user for input

   printf("Number: ");

This gets user input

   scanf("%s", number);

This initializes sum to 0

   int sum = 0;

This iterates through the input string

   for(int i =0;i<strlen(number);i++){

This adds individual digits

       sum+= number[i] - '0';

   }

This prints the calculated sum

           printf("Sum: %d",sum);

   return 0;

4 0
3 years ago
What is the local portion of the e-mail address below? <a href="/cdn-cgi/l/email-protection" class="__cf_email__" data-cfemail="
abruzzese [7]

Every email address is something like this ...  <u>[email protected]</u>

the name after the @ symbol is a domain name that represents the administrative realm for the mail box and the part before the @symbol identifies the name of the mailbox.

<u>twrigley(local portion)</u>@   gumchewer.biz(domain)

twrigley is the local portion  which indicates to the mail server which mailbox the message is from or to.This portion is only important to gumchewer mail server which is why it is called local.


6 0
3 years ago
Create an array named itemDescription containing the following item descriptions:
Lelu [443]

Answer:

var itemDescription = ["1975 Green Bay Packers Football (signed), Item 10582", "Tom Landry 1955 Football Card (unsigned), Item 23015", "1916 Army-Navy Game, Framed Photo (signed), Item 41807", "Protective Card Sheets, Item 10041"];

Explanation:

The following solution will work with javascript. Here we've stored different items in a variable named itemDescription.

8 0
3 years ago
Convert 12 bits to bytes​
Genrish500 [490]

Answer:

1.5 bytes

Explanation:

I byte = 8 bit ....

3 0
2 years ago
Other questions:
  • Kellyn needs to move Slide 8 of his presentation up so that it becomes Slide 6. What best describes how he can do this using the
    13·1 answer
  • You can precede a subquery with the ___ operator to create a conditiion that is true if one or more rows are obstained when the
    10·1 answer
  • How can the Column settings be accessed?
    12·2 answers
  • &gt;&gt;&gt; import math &gt;&gt;&gt; print(math.Pi) 3.141592653589793 &gt;&gt;&gt; def print_volume(): print ("What is the radi
    12·1 answer
  • Samantha wants to create a network group that allows open sharing of data without restrictions. What type of network should she
    9·1 answer
  • Please help, Tech class!!
    14·1 answer
  • On his website, Mario has a video that visitors must click to play. He wants the video to play automatically when the page loads
    9·1 answer
  • What is the best stratiget to avoid paying intrest in your credit cared
    13·1 answer
  • Compare and contrast two fundamental security design principles in network security. Analyze how these principles and how they i
    15·1 answer
  • Select the correct answers
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!