1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fantom [35]
3 years ago
12

What finger is used to key letter c

Computers and Technology
2 answers:
kumpel [21]3 years ago
8 0

Answer:

your pointer finger

sorry if this is wrong

Explanation:

damaskus [11]3 years ago
5 0

Answer:

Your left pointer i know cause my grade in computer class is a A+

Explanation:

You might be interested in
47. Which of these examples demonstrates good netiquette?
Masteriza [31]

Answer:

typing it, on a video detailing how boring and poorly made it is

Explanation:

this is an example of good netiquette because they are criticizing the video game and what good netiquette is is making a comment relevant to the original message. the original message being the video game

3 0
3 years ago
Match the feature to the network architecture,
pochemuha

Answer:

Answer is:  

Client-Server Network

  • expensive to set up
  • has a central server
  • easy to track files
  • useful for a large organization

Peer-to-peer Network

  • useful for a small organization
  • difficult to track files
  • inexpensive to set up
  • does not have a central server

Explanation:

<em>Client-Server Network is ideal for bigger network set up like offices and companies where there will be a central server involved with several clients to access and connected with the server. This is the normal network set up to companies. While, Peer to peer network is ideal for much smaller network, which consists of only two computers to communicate and share files. This network is normally temporary and inexpensive since in only works with two computers.</em>

7 0
3 years ago
What is a frame injection attack in a wireless network?
Romashka-Z-Leto [24]

Answer:

A.Un hacker introduce un cadru fals în timpul transmiterii datelor.

Explanation:

3 0
3 years ago
Read 2 more answers
The more employees can do, the less they have to be managed by supervisors.
zheka24 [161]
False
Don’t take me too seriously cause I could be wrong, but I think it’s false. Unless the employees are like the best hardworking employees, they will likely slack off the second they get the chance. The more they can do just means that they can do more, it doesn’t necessary mean they need less supervision
4 0
3 years ago
Read 2 more answers
You accidentally moved your task bar from the bottom of the screen to the left side. You would like to
Ratling [72]

Answer:

by pressing yes

Explanation:

ik i am a tech god

6 0
3 years ago
Read 2 more answers
Other questions:
  • Jamie has to enter the names, grades, and scores of a group of students into a worksheet. Which option will Jamie use to describ
    11·2 answers
  • For homework, we have to figure out what's in the picture. It's " too close to tell " but I can't figure out what it is. Any ide
    11·1 answer
  • What internet service provider first dominated the internet in the 1990s?
    15·1 answer
  • Which of the following journals is not aimed at the public as well as scientists?
    7·1 answer
  • A ________ is a virus that is triggered on a certain date.
    11·1 answer
  • Choose the types of education an ISS professional
    11·1 answer
  • Help what is a computer made from (computer class question)!!
    9·1 answer
  • Tomahawk Industries develops weapons control systems for the military. The company designed a system that requires two different
    13·1 answer
  • When using for loops and two-dimensional arrays, the outside loop moves across the ___________ and the inside loop moves across
    7·1 answer
  • What happen if ignore the unsafe markings in hand tools in ict​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!