1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
JulsSmile [24]
3 years ago
11

Some touch screens recognize when you touch the screen with two fingers or two hands. If you are looking for a device on which y

ou can do this, what type of touch screen should you search for?
(A) twin-touch
(B) dual-touch
(C) phase-touch
(D) multi-touch
Computers and Technology
1 answer:
olga nikolaevna [1]3 years ago
5 0

Answer:

Multi-touch

Explanation:

  • Multi touch is the technology developed by Apple enabling the touch screen to sense multiple fingers.
  • This is called Multi Touch Technology introduced in the year 2007.
  • This is essentially a Multi Point of Contact with the Surface.
  • In the present day, many devices (mobile devices,touch walls and tablets) have this technology (or feature) enabled in their device.
  • So, option (d) Multi-touch is the correct option.
  • There are no touch screen technologies with the name Twin-touch, Dual-touch, Phase-touch.So, options (a),(b),(c) are wrong options.
You might be interested in
Draw the tree that results when you add the values 10, 20, 30, 40, 50, 60, 70, 80, 90, 100 to each of the following initially em
Kay [80]

Answer:

What exactly are you asking?

Explanation:

Please don't report me, I'll edit my answer once I know the question

6 0
3 years ago
True or false Encryption prevents hackers from hacking data?
nlexa [21]

Answer:

The answer here is False.

Explanation:

Encryption protects the data and not access to data.

In some cases, the hacker may not necessarily be trying to access or decrypt the data. They may prevent one from accessing it by placing a Ransomeware virus on it.

What a Ransomeware virus would do is to prevent the legal and rightful owner from accessing such data (whether encrypted or not) until their demands are met.

In many cases, they would ask for monies or cryptocurrencies.

Another way hackers attempt to get encrypted files is to try to get the decryption keys instead. The best practice against this is to keep decryption keys manually or in a password manager. Another way to protect very sensitive information is to have sensitive systems isolated from the internet.

Cheers

8 0
3 years ago
Give a command that will create a file named listing.dat, in your current (commandsAsst) directory, containing a list of all the
ss7ja [257]

Answer:

Following are the command to this question:

"ls -a ~/UnixCourse/fileAsst > listing.dat"

Explanation:

The above-given code will create a file, that is "listing.dat", and this file will be created in your current directory, which will include the list of all files in the file-asst directory.

In this, Is command is used that uses the directory that is "UnixCourse/fileAsst" and inside this, it will create the "dat" file that is "listing".

8 0
3 years ago
Which of the following Office Online apps is most effective for creating spreadsheets?
navik [9.2K]
The answer is C Excel. Excel allows you to make spreadsheets.

Hope this helps :-)
4 0
3 years ago
Read 2 more answers
Write a Python program that gets a number using keyboard input. (Remember to use input for Python 3 but raw_input for Python 2.)
sergiy2304 [10]

Answer:

def countup():

pass

def countdown():

pass

x = int(input("Choose a number: "))

if x >= 0:

countup()

if x < 0:

countdown()

Explanation:

I start by getting a user input which is saved to variable called "x." I then make if statements to see whether is greater than, equal to, or less than 0. After that, I call the functions.

3 0
3 years ago
Other questions:
  • 1.using synonyms can help make ur writing more________
    11·1 answer
  • You have been approached by the network administrator of the company whose office is adjacent to yours. He has advised you to mo
    5·1 answer
  • What is an optimal Huffman code for the following set of frequencies, based on the first 8 Fibonacci numbers?
    8·1 answer
  • . Convert BAC4 from hexadecimal to decimal. Show your work.
    9·1 answer
  • Write a function stats that takes an array and the number of elements in the array. Then, it computes and prints the minimum val
    8·1 answer
  • What is essence of computer systems and networks?​
    9·1 answer
  • Can you answer the fill in the blanks
    15·2 answers
  • A collection is a container object (data structure) that represents a group of objects often referred to as data or elements of
    6·1 answer
  • Pls help me with this pls
    7·2 answers
  • Collection activities acquire and extract data from the operational environment such that Processing and Exploitation can conver
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!