1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mihalych1998 [28]
3 years ago
11

On which of the following pointing devices can you control the pointer by sliding your fingertip?

Computers and Technology
1 answer:
murzikaleks [220]3 years ago
4 0

Touchpad is used to control the pointer by sliding our fingertip.

Further Explanation:

Pointing devices are the devices which are used to control the pointer on the computer/laptop screens. There are different types of pointing devices.

1. Mouse

2. Touch pad

3. Joy Stick

Out of all the pointing devices, touch pads are the pointing devices on which we slide our fingertip to move the pointer on the screen. The fingertip's movement controls the movement of pointer on the screen. There are also two buttons present with the touch pad which do the work of left and right mouse buttons on the mouse.

Learn More at:

  • brainly.com/question/6013251
  • brainly.com/question/10091644

#LearnwithBrainly

You might be interested in
Deciding whether to explode a process further or determine that it is a functional primitive is a matter of experience, judgment
pickupchik [31]

Answer:

The answer is "True".

Explanation:

The conceptual, abstract design is also known as a logical design. This design doesn't use to discuss in matter of the actual execution. It only has to identify the kinds of information.  

  • In the logical development process, it involves inserting information into a number, which includes the organizations and features of rational networks.
  • It is used to organize the entities, for example, tables for a relation database, in a given market environment into the database systems, that's why the given statement is true.
3 0
3 years ago
_______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the
julia-pushkina [17]

Answer:

Option (A) is the correct answer.

Explanation:

A Computer system can be the target for the crime on which a criminal can acquire the information from the computer system which is stored on it. A Criminal is targeting the system with the help of some software that is entered on the computer system through a network.

In the above question, paragraphs are describing the content related to the crime which targets the computer system. This is a concept of a "computer as target". Hence option "A" is the correct answer while the other is not valid because--

  • Option b suggests the concept behind the storage device of a computer but in the question, it is about the crime of a computer.
  • Option c suggests the concept behind the computer is a criminal but in the question, it is about the crime of a computer.
  • Option d suggests the concept behind the communication of a computer but in the question, it is about the crime of a computer.
4 0
3 years ago
Who Is faster sonic or flash well it all depends on which version of sonic your talking about like for example video game sonic,
zhuklara [117]

Answer:

Flash.

Explanation:

If a computer software could make sonic run even close to the speeds of flash, the software would not be able to handle it.

-Mr. Willams

6 0
2 years ago
What are the challenges of photographing at night? Why did the photographer “paint” the waterfall with the flashlight?
lianna [129]
Because he needed ligh
7 0
3 years ago
Immigrants are allowed to enter the country to work when they have a(n)
Roman55 [17]

Answer:

D. a Visa

Explanation:

4 0
3 years ago
Other questions:
  • The condition, ____, entered in the criteria row of a long text field in a query window would retrieve all records where the lon
    8·1 answer
  • Ryan is looking at investment opportunities as a cloud service provider. He wants to invest in a deployment-based cloud model th
    11·2 answers
  • How does the access point know whether a wireless data packet is intended for its network?
    14·1 answer
  • Ada lovelace designed the first computer
    7·1 answer
  • The Software Engineering Code of Ethics and Professional Practice was developed by Select one: a. Computer Professionals for Soc
    7·1 answer
  • Complete the second clause of the following Prolog program for member/2 where member(X, Y) checks whether X is an element (a mem
    7·1 answer
  • Ben is writing a paper for his college history class, and he wants to include some information he found on a Web site. What are
    5·1 answer
  • Creating Classes
    10·1 answer
  • The most common types of effects include entrances and exits
    11·1 answer
  • Which sentence describe internet safety precautions?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!