1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Basile [38]
3 years ago
5

Operating system software allows you to use your fingers, a mouse or other pointing device to select screen controls, such as bu

ttons and scroll bars or pictures, also called ____.
Computers and Technology
2 answers:
Fofino [41]3 years ago
7 0

Answer:

Operating system (OS) software allows you to use your fingers, a mouse or other pointing device to select screen controls, such as buttons and scroll bars or pictures, also called input device.  

Explanation:

   We call input devices the devices in charge of embedding in a computer. These devices have evolved over time, and there are currently many variants that at the beginning of computing seemed impossible.

    Input devices include the keyboard, which allows you to enter information using alphanumeric keystrokes; the mouse, which works to annotate elements in a graphical environment; the joystick, an elongated element used for games as well as the graphic environment; optical pencil, which acts as a mouse replacement and is used to annotate elements in a graphical environment; the microphone, which serves to capture vibrations that generate sound and transmit information to the machine; the camera, which captures images and transports them to a digital environment; the scanner, which also receives document images.

bagirrra123 [75]3 years ago
5 0
Operating system (OS)<span> software allows you to use your fingers, a mouse or other pointing device to select screen controls, such as buttons and scroll bars or pictures, also called Resource Manager.  </span><span>Operating System manages all the Resources like Memory and Processor and all the Input output Devices, it manages all the Resources of the System. </span>
You might be interested in
Select all that apply. To select more than one worksheet at the same time, which of the following keys on your keyboard can you
Colt1911 [192]
<em>Shift </em>selects multiple worksheets at the same time. <em>Ctrl</em> selects all that you selected with Ctrl pressed.
4 0
4 years ago
Point: A Point in a two dimensional plane has an integer x coordinate value and an integer y coordinate value.
UNO [17]

Answer:

They are connected

Explanation:

8 0
3 years ago
Which type of software has no restrictions from the copyright holder regarding modifications of the softwares internal instructi
gizmo_the_mogwai [7]
The software that has no restrictions from copyright holder regarding modification of the software's internal and its redistribution is called an Open source software. They are being provided for use and redistribution for free, with no cost. They can be easily downloaded on the Internet.
4 0
3 years ago
A. Requiring computer users to log off before leaving for lunch
GuDViN [60]

Answer:

Option A, B, and D.

Explanation:

In the above question, the some details of the question are missing that is the part of the question.

Information Security applies to the mechanisms and techniques built and maintained to secure print, computerized, or any other type of personal, secret and confidential information or records from unauthorized access, usage, exploitation, release, damage, manipulation, or disturbance.

So, the following are the option that is true about the scenario.

Other option is not true about the scenario because Option C the click fraud are not the part or protect from the information security and Option F is not considered to the following scenario.

7 0
3 years ago
Most _____ focus on galning entry over the internet to a secure computer system by finding a
dangina [55]

Most <u>Malware</u>  focus on gaining entry over the internet to a secure computer system by finding a  working user ID and password combination.

<u>Explanation:</u>

A malware is a small computer program which works on the user’s system without knowing to the user. Different malware works differently.

Some malware sits on the user computer, create multiple unnecessary files and make the hard drive full, some people create viruses to show their computer skills which they tend to prove in a wrong way, some malware sits in the computer to steal data especially while using internet.

So there are malware's like Virus, Worm, Trojan, spyware, etc.

5 0
3 years ago
Other questions:
  • All of the following except one are issues that should be covered in an AUP. Which one is the exception?
    5·1 answer
  • Which scientific law states that if a light source radiates isotropically, the light intensity falls off the further you get fro
    5·1 answer
  • A cybersecurity analyst is currently investigating a server outage. The analyst has discovered the following value was entered f
    9·1 answer
  • Which of the following is a quick way to restore the arrow pointer after you have used it for drawing?
    5·1 answer
  • What kinds of dogs are there
    9·2 answers
  • What does t'challa actions reveal about his character( black panther movie)​
    6·1 answer
  • The metric unit used for length
    5·1 answer
  • Brainly app won't let me watch ads anymore. I search my question and there is no skip button to watch an ad it only makes me buy
    7·2 answers
  • Web designers use programming languages to write websites. A True <br> B False​
    15·2 answers
  • Write a program to output 3 lines of text with the following information:
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!