1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LiRa [457]
3 years ago
14

The computer mouse is used to

Computers and Technology
1 answer:
galben [10]3 years ago
6 0
The answer is C , what else would you do with the mouse?
You might be interested in
The students of a college have to create their assignment reports using a word processing program. Some of the questions in thei
ser-zykov [4K]

Answer:

Table function

Explanation:

The table function can also be used to compare between items. The items can be arranged in columns and the features tonbe compared can be placed in columns. With this one can make comparison between the items.

5 0
3 years ago
Select the correct answer. Which statement is true about the guardian archetype?
kobusy [5.1K]

Answer:

They assist the hero in difficult situations

Explanation:

because its right

3 0
3 years ago
Which of these purchases is most likely to be paid for with a credit card
Vesna [10]

Answer:

plane ticket?

Explanation:

7 0
3 years ago
Most search engines work with keyword queries in which you enter one or more words, called _______ _______.
Dennis_Churaev [7]
Search terms.

I hope you like this, please Brainliest me, and have a wonderful night! :D
7 0
3 years ago
Why do the fnaf animatronics try to kill you?
wlad13 [49]

Answer:

Because they think you're purple guy who killed them they tryna get revenge and stuff you in a suit like what happened to them

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • What is transmission control protocol?
    7·1 answer
  • 5. Write a program to remove any duplicate letters from a word and display the new word maintaining the original order. For exam
    12·1 answer
  • Summarize who you believe cyber criminals are, and why?
    8·1 answer
  • "A software package developed to handle information requirements for a specific type of business is called a horizontal applicat
    8·2 answers
  • What is blockchain? How it works? I heard bitcoin uses it.
    8·1 answer
  • Create a function (prob3_6) that will do the following: Input a positive scalar integer x. If x is odd, multiply it by 3 and add
    15·1 answer
  • What is the range of possible sizes for side<br> x?<br> 4.0<br> 2.7
    8·1 answer
  • You are the administrator for a network with a single Active Directory domain called westsim. All computer accounts reside in or
    5·1 answer
  • Shadow and highlight create depth (3D).<br> TRUE OR FALSE
    6·1 answer
  • Besides a soho router, which of these devices is a network printer most likely to be connected to? a. router b. server c. workst
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!