1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aev [14]
3 years ago
13

Under which jeys do the page up and page down keys fall under

Computers and Technology
1 answer:
Mademuasel [1]3 years ago
4 0

Answer:

Page up(PgUp) and Page down(PgDn) keys fall under the navigation keys.

Explanation:

Page up(PgUp) and Page down(PgDn) keys fall under the navigation keys.

They include the four Arrow keys, Page Up, Page Down, Home and End keys.

<u>Arrow Keys:</u>

One of four computer keys marked with an up, down, left, or right arrow, used for moving the cursor.

<u>Page Up and Page down:</u>

Page Up and Page Down keys abbreviated as PgUp and PgDn are two keys commonly found on computer keyboards. The two keys are used to scroll up or down in documents.

<u>Home Key:</u>

The Home key is used to return the typing cursor to the beginning of the line on which you are currently typing.

<u>End Key:</u>

The end key is opposite to home key. It is used to return the typing cursor to the end of the line on which you are currently typing....

You might be interested in
You are informed that all the users within the network are unable to access the Internet. You decide to start troubleshooting fr
sveticcg [70]

Answer: Bottom up approach

Explanation:

We should start from the bottom i.e.starting from the physical layer by inspecting the lan, switches, router and also as we move up the level we also need to check the software application and the various routing protocols at each successive levels.

Hence, we use bottom up approach.

3 0
3 years ago
Is computer a machine?
Anit [1.1K]
Yes a computer works on many smaller items like a motherboard and a powersupply etc. to work in unison to be able to handle things you want to do on it.
8 0
3 years ago
File explorer will display the latest files that you have opened and/or edited under the __________ files.
GalinKa [24]
The answer is Recent
5 0
3 years ago
The Taylor series expansion for ax is: Write a MATLAB program that determines ax using the Taylor series expansion. The program
zalisa [80]

Answer: (a). 11.3137

(b). 22.849

Explanation:

Provided below is a step by step analysis to solving this problem

(a)

clc;close all;clear all;

a=2;x=3.5;

E=10;n=0;k=1;sn1=0;

while E >0.000001

cn=((log(a))^n)*(x^n)/factorial(n);

sn=sn1+cn;

E=abs((sn-sn1)/sn1);

sn1=sn;

n=n+1;

k=k+1;

end

fprintf('2^3.5 from tailor series=%6.4f after adding n=%d terms\n',sn,n);

2^3.5 from tailor series=11.3137 after adding n=15 terms

disp('2^3.5 using calculator =11.3137085');

Command window:

2^3.5 from tailor series=11.3137 after adding n=15 terms

2^3.5 using calculator =11.3137085

(b)

clc;close all;clear all;

a=6.3;x=1.7;

E=10;n=0;k=1;sn1=0;

while E >0.000001

cn=((log(a))^n)*(x^n)/factorial(n);

sn=sn1+cn;

E=abs((sn-sn1)/sn1);

sn1=sn;

n=n+1;

k=k+1;

end

fprintf('6.3^1.7 from tailor series=%6.4f after adding n=%d terms\n',sn,n);

disp('6.3^1.7 using calculator =22.84961748');

Command window:

6.3^1.7 from tailor series=22.8496 after adding n=16 terms

6.3^1.7 using calculator =22.84961748

cheers i hope this helped !!!

7 0
3 years ago
LITERALLY PLS ANYONE!!! 90 pointsss!
Doss [256]

7. Intentional Virus Setting is when you the user purposely spread computer viruses in order to do harm. It should be noted that this is highly illegal (no duh) with a sentence of up to 10 years and $250,000 in penalties assuming you are convicted under the Computer Fraud and Abuse Act of 1986 here in the States.

8. intrusion of solitude, appropriation of name or likeness, public disclosure of private facts, and false light.

9.  Intentionally creating and/or sending a virus and infecting people's computers is against the law, and can result in jail time or a fine.

10. Some examples are: Deception - Lying about how information will be used. Violation of confidentiality - Disclosing someone's personal information without consent. Intrusion - Interference in an employee's personal life. Misappropriation - Using a person's likeness to promote a product without his consent.

11. Everyone wants PRIVACY for themselves, and everyone wants ACCOUNTABILITY from others. Privacy is a basic human need, and invasion of privacy can have serious psychological and emotional consequences, including paranoia, anxiety, depression and broken trust. Invasion of privacy is both a legal and an ethical issue.

12. A cause of action for invasion of privacy entitles the plaintiff to recover damages for the harm to the particular element of his or her privacy that is invaded. Thus, one who suffers an intrusion upon his or her solitude or seclusion, may recover damages for the deprivation of his or her seclusion.

13. An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet. Many businesses and educational facilities require that employees or students sign an acceptable use policy before being granted a network ID.

14. Intellectual property refers to creations of the mind: inventions; literary and artistic works; and symbols, names and images used in commerce. Intellectual property is divided into two categories: Industrial Property includes patents for inventions, trademarks, industrial designs and geographical indications.

PLEASE PLEASE PLEASE HELP WITH MY RECENT!!!!!!

btw hope this helps if it does please make brainliest :)

6 0
3 years ago
Read 2 more answers
Other questions:
  • When you add an rss feed to hootsuite publisher, posts from blogs and websites you designate will be?
    5·1 answer
  • Which delivery model is an example of a cloud computing environment that provides users with a web based email service ?
    9·2 answers
  • List and the deference between MS access objects​
    8·1 answer
  • What are two constraints that continuous-media files have that conventional data files generally do not have?
    12·1 answer
  • Label the strength of a beer based on its ABV. For each beer display the beer's name, ABV, and a textual label describing the st
    8·1 answer
  • 6. Consider a circle of diameter d cm.
    11·1 answer
  • In addition to paying $100 per month for health insurance, sam is responsible for paying her first $500 of medical bills every y
    10·1 answer
  • Which of the following allows the transmission of voice and often video communication over the internet?
    12·1 answer
  • What is this on g00gel Document, and how do I fix it?
    10·2 answers
  • Please answer fast computer picture above​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!