1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LiRa [457]
3 years ago
14

The computer mouse is used to

Computers and Technology
1 answer:
galben [10]3 years ago
6 0
The answer is C , what else would you do with the mouse?
You might be interested in
3423509 join the kahoot its for fun its about the holidayss:)
zheka24 [161]

Answer:

:)

Explanation:

7 0
3 years ago
25 pts! If programmers cannot write an algorithm because the problem is too complex, which methodology can they use to reach an
Setler [38]

Answer:

D, most likely thats what I was taught .

3 0
3 years ago
________ speeds time to insights and enables better data governance by performing data integration and analytic functions inside
Lyrx [107]
<h3><em>↓Answer↓</em></h3>

<u>In-database analytics</u> speeds time to insights and enables better data governance by performing data integration and analytic functions inside the database.

3 0
2 years ago
Which option is available when reviewing changes and using the Accept command in the Compare group?
Zarrin [17]

Answer: Accept only one at a time, all on a slide, or all changes in a presentation.

Explanation:

Took the review

6 0
2 years ago
Read 2 more answers
A network engineer is troubleshooting a newly deployed wireless network that is using the latest 802.11 standards. When users ac
Lerok [7]

Answer:

it will make the wireless network faster and it is a performance network i am pretty sure.

Explanation:

5 0
3 years ago
Other questions:
  • A school librarian has been asked to identify inappropriate Internet usage. Which students would most likely be reported to the
    5·2 answers
  • Write a program that reads a 4-bit binary number from the keyboard as a string and then converts it into decimal. For example, i
    11·1 answer
  • Which of the following could occur when both strong and weak ciphers are configured on a VPN concentrator? (Select TWO) A. An at
    5·1 answer
  • Once secured a wheelchair may move up to 6 inches in any direction
    6·1 answer
  • ap csp The local, remote, and upstream _______ can each have multiple ___ _____. When a participant in a collaborative group on
    5·1 answer
  • A coffee shop is considering accepting orders and payments through their phone app and have decided to use public key encryption
    10·1 answer
  • One condition for deadlocks is the circular-wait condition. One way to ensure that this condition never holds is to impose a tot
    12·2 answers
  • Identify a true statement about heuristics: a. They are more complicated than algorithms. b. Unlike algorithms, they do not perm
    15·1 answer
  • Which of the following strategies will help you to stay focused and on topic while writing your essay?
    10·2 answers
  • PL I BEG YOU HELP
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!