1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natita [175]
3 years ago
10

Meaning of 'WSAD" iiiiii

Computers and Technology
2 answers:
Anit [1.1K]3 years ago
7 0

Answer:

Websphere Studio Application Developer

OLga [1]3 years ago
6 0

Answer:

WSAD are the four keys on a QWERTY keyboard (standard keyboard) that are used for gaming.

W: this key is typically used to go forward in video games.

S: this key is used to go back or backwards in gaming.

A: "A" is used when a player wants to go left in a video game.

D: "D" is used when a player wants to go right in a video game.

Hope this answered your question! :)

You might be interested in
You are the administrator for the contoso.com website. recently, the server hosting the website had a failure that caused it to
Alisiya [41]
Protecting the Power supply
Adding disk Arrays
Install an NLB Cluster
4 0
3 years ago
which of the following present the most significant obstacle to developing IT security if we consider commerce and marketing?
Dmitry_Shevchenko [17]

Answer:

There is no direct return on investment in building security systems.

Security systems are detrimental to usability and can make IT systems less functional, and therefore less attractive to the customer.

There is pressure to reduce the time it takes to get a new IT product or system onto the market, so security systems are sacrificed in order to reduce the time-to-market.

Explanation:

Cyber security has always been challenging for the organizations. There have been groups which are always looking for loop holes in cyber security and hacks the details and asks the ransom to restore. IT systems have now been more complex in this era. Users are increasing every new day and network accounts security is more demanding. Computer connection are more complex and require special attention to control them. The obstacles in IT systems are of concern as there is need for dynamic IT solution to counter the challenging hackers.  New programs and customized demand of IT systems need customized IT security systems.

4 0
3 years ago
5 examples of a linear motion in object.
NNADVOKAT [17]

An example of linear motion is an athlete running 100m along a straight track. Linear motion is the most basic of all motion. ... Neglecting the rotation and other motions of the Earth, an example of linear motion is the ball thrown straight up and falling back straight down.


3 0
3 years ago
Can someone smart help me
nalin [4]

Answer:

Answer

Explanation:

The only thing that is wrong with this code is the fact that the link is not completed (should be https://[link name].com/)

Other than that the code is fine

7 0
3 years ago
How has the growth of industries that use computer technology changed employment?
KIM [24]
Well Member The Industrial Revolution? Well If You Forgot It Was Like Making Goods Like With Your Hands But Every Since The Factories Came Works Been Kind Of Hard To Find And Such , So If The Growth Of Industries That Use Technology Changes Employment Than We Wouldn't Have Work It Would Have Been The Industrial Revolution All Over Again
8 0
3 years ago
Other questions:
  • This program will output a right triangle based on user specified height triangle_height and symbol triangle_char. (1) The given
    9·1 answer
  • Please answer fast screenshot included - thanks in advance
    11·1 answer
  • Given two Generic variables, A with value "123" and B with value 456, what would the Write Line output of A + B be? 123456 579 A
    5·1 answer
  • The presentation layer describes the layer where computers interact with _____
    8·2 answers
  • In python,_______ are used to define the conditions necessary for a while loop to run.
    7·2 answers
  • Your ___ can provide hardware firewall protection for your home network where it connects to the ISP's network, just as ISP netw
    12·1 answer
  • EDI, ________, smart cards, and digital certificates are designed to support safe and secure online transactions.
    8·1 answer
  • Web résumés allow you to include extra graphics and images that you would not include in a traditional résumé. please select the
    13·1 answer
  • What is the correct format to use when<br> inserting a date in Excel?
    15·1 answer
  • in a particular factory, a team leader is an hourly paid production worker who leads a small team. in addition to hourly pay, te
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!