1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Damm [24]
3 years ago
11

A user complains that his new mouse doesn't work right. He has an old system at home and when he has had this problem, he cleane

d the ball on the underside of the mouse to fix it, but this mouse doesn't have a ball on the underside. What can you tell him about his mouse
Computers and Technology
2 answers:
IrinaK [193]3 years ago
6 0

Answer:

He is using an optical mouse

Explanation:

The computer mouse is a pointing device that identifies and translates two-dimensional motion to a pointer on a display. The use of the mouse cannot be overemphasized, because it ensures the smooth usage of the Graphics User Interface of Operating Systems (OS) and application environments.

There are different types of mice, such as the mechanical (ball controlling mouse), optical and laser, 3D, gaming, ergonomic mouse and so on.

An optical mouse uses Light-emitting Diode (LED), optical sensor and digital signal processing (DSP).

To properly use the optical mouse he just got, he should place the mouse on a mouse pad and avoid using it on glossy surfaces.

Talja [164]3 years ago
5 0

Answer:

The mouse is an optical mouse.

Explanation:

The computer input devices are used to give command or input data to the system for computing. There are different types of input devices, examples of input devices are keyboard, mouse, trackpad, joystick etc.

The mouse is an input device used to control a pointer on the computer screen. Its control is two dimensional and it used for clicking on icons to execute a task. There are several types of mouse, they are optical mouse, mechanical mouse.

The optical mouse has no ball under it, because it is replaced with light emitting diodes which should be used on a dull-sufaced mouse pad to work efficiently. The mechanical mouse uses a ball to track and control the pointer on the screen.

You might be interested in
In a five-choice multiple-choice test, which letter is most often the correct
tatiyna

I believe the answer is C.

5 0
3 years ago
Read 2 more answers
any one that owns a chrome book there is a new update there is new features and there is a game on settings where you see what y
timama [110]

Answer:

THANK YOU SO MUCH! I AM ON MY CHROME BOOK RIGHT NOW AND WAS HESITATING TO DOWNLOAD THE UPDATE!

Explanation:

4 0
3 years ago
Read 2 more answers
A security administrator is reviewing the following information from a file that was found on a compromised host: Which of the f
Roman55 [17]

Answer:

C. Trojan

Explanation:

In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.

This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.

In this scenario, a security administrator is reviewing the following information from a file that was found on a compromised host: "cat suspiciousfile.txt."

Some of the ways to prevent vulnerability in a network are;

1. Ensure you use a very strong password with complexity through the use of alphanumerics.

2. You should use a two-way authentication service.

3. You should use encrypting software applications or services.

8 0
3 years ago
What is a spec sheet?
Artist 52 [7]
spec sheet is a document that summarizes the performance and other technical characteristics of a product, machine or component.
8 0
3 years ago
List any two features of this computer
zaharov [31]

Answer:

John Mauchy 1. designed to be a stored-program computer 2. it was binary rather than decimal

3 0
3 years ago
Other questions:
  • What is one important feature of an aup? 1. a list of all available courses. 2. a clear out line of the consequences of violatin
    12·2 answers
  • _____ software can help a company manage security, enforce corporate strategies, and control downloads and content streaming fro
    11·1 answer
  • 4. Scientists are not concerned with the human impact on the environment. True or False?
    6·2 answers
  • Can y’all help me with these questions ?
    5·1 answer
  • Write a short program that allows the user to input a positive integer and then
    5·1 answer
  • Provide a few examples of how cryptography actually secures data.
    8·1 answer
  • Communication is the transmission of messages to large audiences.
    14·1 answer
  • When you use information hiding by selecting which properties and methods of a class to make public, you are assured that your d
    14·1 answer
  • How do you reflect yourself in the topic (filters)​
    14·1 answer
  • Is it true that if the user log out the computer will turn off automatically​
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!