1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gre4nikov [31]
3 years ago
9

In which two places are a keyboard usually held on a laptop?

Computers and Technology
1 answer:
Margarita [4]3 years ago
6 0

Answer:

Bottom of the case

Through a connector

Explanation:

Regularly we must see the bottom of the case to remove some screws, and then move the keyboard, but first, you have to remove a connector.

The keyboards have evolved from windows and IMB built their own keyboards for desktop, and now we have digital keyboards, and replace a keyboard in a laptop can change for the model or the size.

You might be interested in
Write the steps for displaying multiple subtotal functions in excel.
Sloan [31]

We can display multiple subtotal functions in excel using the following steps.

<u>Explanation</u>:

Step1: Enter the data you want to add in the excel sheet.

Step2: Select the cell containing the data you want to add.

Step3: Click the Data Tab

Step 4: Now select the SUBTOTAL command in the outline group.

Step 5: An option called ATEACHCHANGEIN will be available.

Step 6: Now select the drop-down menu under that option.

Step 7: After selecting the drop-down menu to select the columns you want to use for the first level subtotals.

By following these steps, we can display multiple subtotal functions in excel.

3 0
3 years ago
The idea that an object can exist separate from the executing program that creates it is called
vaieri [72.5K]

Answer:

Explanation:

Apply handrub to palm of one hand.

Rub hands together covering all surfaces of hands and fingers.

Rub until handrub is absorbed.

3 0
3 years ago
Given two ArrayLists of sorted strings (alphabetically ascending), write down a method to merge these sorted strings’ ArrayLists
Elena-2011 [213]

Answer:

see explaination

Explanation:

import java.util.ArrayList;

import java.util.Arrays;

public class Merge {

public static ArrayList<String> mergeList(ArrayList<String> lst1, ArrayList<String> lst2) {

ArrayList<String> result = new ArrayList<String>();

int i = 0, j = 0;

while (i < lst1.size() || j < lst2.size()) {

if (i < lst1.size() && (j >= lst2.size() || lst1.get(i).compareTo(lst2.get(j)) < 0)) {

result.add(lst1.get(i++));

} else {

result.add(lst2.get(j++));

}

}

return result;

}

public static void main(String[] args) {

ArrayList<String> lst1 = new ArrayList<>(Arrays.asList("Austin", "Dallas", "San Fransisco"));

ArrayList<String> lst2 = new ArrayList<>(Arrays.asList("Boston", "Chicago", "Denver", "Seattle"));

System.out.println(mergeList(lst1, lst2));

}

}

8 0
3 years ago
Which of these are examples of metadata for an audio file of a song recording?
alexandr1967 [171]

Answer:

B

Explanation:

The metadata is only the information in the background aka the info not directly given.

5 0
3 years ago
Read 2 more answers
A _______ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user
sergeinik [125]
<h2>A <u>Rogue attack</u> utilizes software just to attempt hundreds of frequent phrases in a row.</h2>

  • Rogue access equipment would be any WLAN radio channel that isn't even authorized to communicate or join the corporate connection.
  • Whenever they have been misconfigured as well as set up without authentication, it creates a new security vulnerability potentially gaining simple access to a private network.

Thus the response above is correct.

Learn more about software attacks here:

brainly.com/question/25407509

7 0
2 years ago
Read 2 more answers
Other questions:
  • What is the difference between a denial-of-service attack and a distributed denial-of-service attacks? which is potentially more
    10·1 answer
  • What are the two major components of a processor cooler assembly?
    15·1 answer
  • The memory unit of a computer has 256k words of 32 bits each. The computer has an instruction format with 4 fields: an opcode fi
    15·1 answer
  • Which of the following is true about radio waves? They have short wavelengths. They have high energies. They reveal hot gases. T
    10·2 answers
  • Universal Containers uses a custom field on the account object to capture the account credit status. The sales team wants to dis
    7·1 answer
  • Which documents might an employer expect to find in a career portfolio?
    15·2 answers
  • Windows displays a(n)
    11·1 answer
  • An array, numbers, of integers is filled with 100 random numbers whose values are greater than 10 and less than 255. You DO NOT
    7·1 answer
  • How can a cell phone tower help people​
    11·2 answers
  • What role do play in medicine ​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!