1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wolverine [178]
3 years ago
12

Sherri has recently been injured. She is having a problem using her left hand and would like to use a stylus to move her mouse a

round the screen on her laptop computer. What device can Sherri add to her system to allow a non-touch screen laptop to use a stylus to manipulate the screen?a. Inverterb. OLEDc. Touch screend. Digitizer
Computers and Technology
1 answer:
Alona [7]3 years ago
6 0

Answer:

d) Digitizer

Explanation:

In computing a digitizer refers to a piece of hardware that converts analogue input to digits. Analog signals refers to signals that are in a continuous range such as light, sound and records. A digitizer therefore basically gets signals from (touch, sound, light etc.) and transforms and transports it to the CPU. On a tablet or laptop, the signals will received from the finger of a stylus (digital pen).

You might be interested in
According to the video, what are some hazards Stationary Engineers may face? Check all that apply. noise, hazardous materials, d
NISA [10]

Answer:

noise, hazardous material, burns, electric shocks, moving parts.

Explanation:

i got it right on edge

6 0
3 years ago
Read 2 more answers
Describe at least three virus scanning techniques
Natasha_Volkova [10]

Answer:

 Virus scanning technique is the process to scan the software and identify the various viruses in the computing device. The basic aim of virus scanning technique is to provide the information security and review virus in the given program.

The three virus scanning techniques are as follow:

Behavior detection: This type of detection observe the execution of the program and helps in modifying the host file in the system.

Signature based detection: This type of detection uses various type of key aspects for examine the file for creating the fingerprint. It basically represent the byte stream in the file.

Heuristics detection: The basic aim is to detect or examine the files and it is basically designed to improve the security system. It is also known as heur.

4 0
3 years ago
Computer Works is a computer accessories manufacturer based in Brazil. All customers in South America pay the same freight charg
arsen [322]

Answer: Zone

Explanation:

  The zone pricing is refers to the process which establishing a price for the various types of services and products that relying upon where individuals get them.

In the zone pricing process event, if a customer purchases something from the zone A and, at that point something very similar in Zone B, then they need to pay various costs.  

An organization and company need to  use the zone pricing for paying the cost for the transportation. it is also used in organization for the pricing strategies.

4 0
4 years ago
A computer may keep freezing if it's software is up-to-date? <br> True <br> False
tester [92]

Answer:

false

Explanation:

6 0
4 years ago
Write a Java code statement for each of following:
Naddik [55]

Answer:

double decimal1, decimal2;

int whole;

Explanation:

Required

Declare 2 decimals and 1 int.

The syntax to declare a variable is:

<em>data-type variable-name;</em>

To declare decimal, we simply make use of double or float data types.

So, we have:

double decimal1, decimal2; ----> for the decimal variables

And

int whole; ---- for the whole number

6 0
3 years ago
Other questions:
  • public class BaseballTeam { private String city, mascot; private int numberOfPlayers; @Override public boolean equals(Object obj
    10·1 answer
  • You receive a file named Project4.xlsx as an attachment to an email message. What do you expect the file to contain?
    8·1 answer
  • Describe how the spoofing attack can affect multiple network layers (application, transport, network, and data link layers).
    14·1 answer
  • Match each document to its respective type.
    8·2 answers
  • Brian's father drives a car that uses voice commands for navigation. Which Al application field is Brian's father using?
    11·1 answer
  • How are some businesses capitalizing on social media at the time of someones death
    7·1 answer
  • Does anyone know what edmodo is? If you do please tell me what it is and what you do on edmodo.
    15·1 answer
  • Why transport layer is usingconnectionless services if network layer is providing connection oriented services?
    10·1 answer
  • Helllllllllppppppppppp
    9·1 answer
  • What do macOS and Windows use to prevent us from accidentally deleting files?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!