1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KIM [24]
3 years ago
11

Sandy's keyboard is not inputting data into her computer which key should she press to verify it is connected to her computer...

.she should press what key and check the light on the keyboard ​
Computers and Technology
1 answer:
Ksivusya [100]3 years ago
5 0

Answer:

Windows key,capslock key for verify connectivity

Explanation:

Sandy's can verify whether her keyboard is working or not by pressing the windows key. Caps Lock and Num lock key will turn on the light on keyboard and she shall see whether her keyboard is functioning or not. This method is being used everywhere to verify the keyboard connectivity.The light function can also be checked by using Caps Lock or Num lock key as well. Some keyboard offers the in built light, which can be turned on by pressing Alt+Space bar.

You might be interested in
quiz Flavio visits a local coffee shop on his way to school and accesses its free Wi-Fi. When he first connects, a screen appear
n200080 [17]

Answer:

Captive portal.

Explanation:

A Wi-Fi can be defined as a wireless local area network that allows network devices such as access points (APs), computers (both laptops and desktops), smartphones, smart televisions, etc., to communicate with each other wirelessly over a short-ranged network. It is a standard communication network that uses radio waves to establish a channel (medium) between multiple network devices.

In this scenario, when Flavio first connects to a Wi-Fi, a webpage appears requiring him to first agree to an Acceptable Use Policy (AUP) before continuing. Thus, the type of access point (AP) he encountered is a captive portal.

A captive portal can be defined as a webpage that's been designed on a networking device to be viewed and interacted with by the user of a public-access network such as a Wi-Fi, before he or she is granted an access to the network (internet).

6 0
2 years ago
What short (two letters!) but powerful boolean operator can check whether or not one string can be found in another string?
True [87]

Answer:

OR

Explanation:

"OR" expands a search by telling the database that any of the words it connects are acceptable. This is particularly beneficial when you are searching for synonyms, such as “the victorian age” OR “sexual puritanism”  

So, if you type in “the victorian age” OR “sexual puritanism”, your results will include articles with either term, but not necessarily both.

4 0
3 years ago
What kind of energy transformation occurs when you call someone on a cell phone?
andrew11 [14]

The <em><u>sound energy into electric energy and then into radiant energy.</u></em>

<em>[That's it]:)</em>

5 0
1 year ago
#A year is considered a leap year if it abides by the #following rules: # # - Every 4th year IS a leap year, EXCEPT... # - Every
lara [203]

Answer:

To check if the year comes under each 100th year, lets check if the remainder when dividing with 100 is 0 or not.

Similarly check for 400th year and multiple 0f 4. The following C program describes the function.

#include<stdio.h>

#include<stdbool.h>

bool is_leap_year(int year);

void main()

{

int y;

bool b;

 

printf("Enter the year in yyyy format: e.g. 1999 \n");

scanf("%d", &y);     // taking the input year in yyyy format.

 

b= is_leap_year(y);  //calling the function and returning the output to b

if(b==true)

{

 printf("Thae given year is a leap year \n");

}

else

{

 printf("The given year is not a leap year \n");

}

}

bool is_leap_year(int year)

{

if(year%100==0)   //every 100th year

{

 if(year%400==0)   //every 400th year

 {

  return true;

 }

 else

 {

  return false;

 }

}

if(year%4==0)  //is a multiple of 4

{

 return true;

}

else

{

 return false;

}

}

Explanation:

Output is given as image

5 0
3 years ago
A network with 6 bits remaining for the host portion will have how many usable hosts?​
Readme [11.4K]
<span>A network with 6 bits remaining for the host portion will have 62 usable hosts. The netmask is </span><span>255.255.255.192/26, the shorthand is [6-bit] which is equal to the number of addresses as <span>= 62 hosts + 1 bcast + 1 net base</span></span>
6 0
2 years ago
Other questions:
  • Which statement is true regarding the Quick Access toolbar?
    11·2 answers
  • Your Economics teacher has asked you to create a chart showing how supply and demand affects the price of gasoline. Which applic
    13·2 answers
  • Hello, can you help me answer these questions?
    9·2 answers
  • The INC and Dec instruction do not effect the__________ flag
    6·1 answer
  • The network layer of the Internet model uses the _____________ protocol to route messages though the network.
    13·1 answer
  • The _________ in Java is passed by value but ______ is passedby reference.
    5·1 answer
  • CHALLENGE ACTIVITY 3.7.2: Type casting: Reading and adding values.
    10·1 answer
  • Which online article citation is correctly formatted according to MLA standards?
    15·2 answers
  • You are writing a program using the Java language. Which of the following is a requirement of Java syntax?
    6·1 answer
  • Silas develops this algorithm to compute the calories burned for an activity for a given number of minutes and body weight: If t
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!