1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
S_A_V [24]
3 years ago
15

Where is the typical location of a touchpad inside of a laptop?

Computers and Technology
1 answer:
Komok [63]3 years ago
3 0

i would say a or b but i think its A

You might be interested in
Given positive integer numInsects, write a while loop that prints that number doubled without reaching 200. Follow each number w
True [87]

Answer:

The below code is pasted in the place of "/*Your solution goes here */"

while(numInsects<200) // while loop

       {

            System.out.print(numInsects+" "); // print statement

            numInsects=numInsects*2; // operation to print double.

       }

Output:

  • If the user gives inputs 16 then the output is 16 32 64 128.
  • If the user gives inputs 25 then the output is 25 50 100.

Explanation:

  • The above code is in java language in which the code is pasted on the place of "Your solution" in the question then only it can work.
  • Then the program takes an input from the user and prints the double until the value of double is not 200 or greater than 200.
  • In the program, there is while loop which checks the value, that it is less than 200 or not. If the value is less the operation is performed otherwise it terminates.
5 0
4 years ago
Graphic software task​
seraphim [82]

Answer:

Graphic Designers

ProofHub as Project Management Tool. ProofHub is a versatile project management software for designers. ...

Jira. ...

Kanbanize. ...

Trello as Project Management Software for Graphic Designers. ...

Basecamp as Tool for Project Management. ...

Podio. ...

Asana. ...

Dropbox.

More items...•

7 0
3 years ago
What is a benefit of the Name Manager feature?​
Ostrovityanka [42]
Makes it personalised to you. If you don’t want people to use your excel work , putting your name on it or the person it belongs to’s name can make sure that it belongs to you or who it is meant to belong to.
6 0
3 years ago
Read 2 more answers
A user saves a password on a website the user logs into from a desktop. Under which circumstances will the password be saved on
9966 [12]

Answer:

Same Browser

Explanation:

If we access some password for some website in from some computer. It will be saved in the browser of the computer. Whenever we access the website from some other computer and we want to login we need the same browser.

In this process, browser is sync by using our mailing address. Whenever we want to access the pasword of different website from some other device, we need to sync that device browser with the same mailing address.

In this process all password that are saved on other device may access from any device.

7 0
3 years ago
Which of the following are characteristics of global variables? Check all that apply.
algol [13]

Answer:

A and D

Explanation:

took the test

7 0
3 years ago
Read 2 more answers
Other questions:
  • How do forensic pathologist determine time of death
    13·1 answer
  • Isaac is researching Abraham Lincoln’s life for a social studies report. He finds an encyclopedia that includes original letters
    5·2 answers
  • Explain why Windows and Linux implements multiple locking mechanisms. Describe the circumstances under which they use spinlocks,
    13·1 answer
  • How do you merge on excel?​
    5·1 answer
  • EASY POINTS what favorate food<br> so easy
    7·2 answers
  • What is the 3 different storage requirements a computer has to process data​
    12·1 answer
  • Adding Page Numbers in the Footer
    15·1 answer
  • Interstate highway numbers Primary U.S. interstate highways are numbered 1-99. Odd numbers (like the 5 of 95) go north/south, an
    8·1 answer
  • Which of these commands is found by default on the quick access toolbar 1)save 2)new 3)open 4)print
    10·1 answer
  • A computer is the __________ of an attack when it is used to conduct an attack against another computer.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!