1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lina20 [59]
4 years ago
9

Which type of computing device is best suited to having a digital pen as an input device?

Computers and Technology
1 answer:
Rama09 [41]4 years ago
8 0

Answer: B. Personal Digital Assistant (PDA).

Although some of the other devices listed may have the capability of allowing the use of a digital pen, the use of the pen will be somewhat unnecessary. Let's take the personal computer and laptop for instance. In a personal computer and laptop we already have a mouse or track pad that can be used to navigate and select objects in the computer.

For the smart television, most smart televisions can actually be operated with gestures or voice command, the use of a digital pen will also not help due to the size of the screens of the televisions.

In the past we had some mobile phones that have a stylus as a pointer. This type of technology has now been change to touch screens that are more effective for the different types of mobile being produced now a days.

Most PDA's come with a screen that requires a small amount of pressure to activate commands. Digital pens also come with different functions that allow the device to draw, record audio, and even shortcut commands for these devices. These digital pens input are then converted by device and translated into computer language.

You might be interested in
"identify three data types covered in the database programming with sql course."
ankoles [38]

I guess the correct answer is VARCHAR, DATE, CHAR

VARCHAR - Hοlds a variablе lеngth string (can cοntain lеttеrs, numbеrs, and spеcial charactеrs). Thе maximum sizе is spеcifiеd in parеnthеsis. Can stοrе up tο 255 charactеrs.

DATE - A datе. Fοrmat: YYYY-MM-DD

CHAR - Hοlds a fixеd lеngth string (can cοntain lеttеrs, numbеrs, and spеcial charactеrs). Thе fixеd sizе is spеcifiеd in parеnthеsis. Can stοrе up tο 255 charactеrs

6 0
3 years ago
What, if anything, is returned by the method call rearrange ("apple")?
Otrada [13]

Answer:

\boxed{E} \to  \boxed{nothing \: is \: returned \: due \: to \: run \: tie \: error}

7 0
3 years ago
1) which colour filter is used to pumps up black and white effects?
LuckyWell [14K]

1.c) pluto

2. a)compare

3.b) crop

5 0
4 years ago
"On a TCP/IP network, which of the following are used by a router to determine the destination of a packet?"
Nastasia [14]

Answer: Switching packets function.

Explanation: while the main function of a router is to forward packets to their target destination, this can be actualised by adopting a switching packet function.

Switching packet function is the process which the router uses to accept a packet from one interface and passes it to another interface. The main function the switching packet plays is to encapsulate the packets in the right data link frame type for the data link meant to be sent out.

The switching is about moving the packet to the right destination without been mistaken with the layer 2 switch function.

3 0
4 years ago
Todays hard drives give up to or more than 1000gb of space. true or false
olya-2409 [2.1K]
Its true because most 2017 harddrives come with at least 250gb 
3 0
4 years ago
Other questions:
  • Debuted by the Lumiere Brothers, a hand cranked device that showed moving pictures to an audience​
    7·1 answer
  • Given the network 192.168.100.0/24, we are going to segment this network into two subnets, Subnet A and Subnet B. The hosts requ
    10·1 answer
  • ___signs tell you what you can or can't do, and what you must do ?
    5·2 answers
  • What are the pros and cons of stone, wood, brick, concrete, steel, and glass for architecture building materials?
    7·2 answers
  • Linux implements _________ to determine how a user is to be authenticated and whether there are password policies associated wit
    11·1 answer
  • O O O O O O O
    9·1 answer
  • When an antivirus program identifies a virus and quarantines this file, has the malware been eradicated
    7·1 answer
  • What is stored in studentScores after running the program code?
    5·1 answer
  • unlike the barcode-based tracking system, a radio frequency identification system offers a .
    11·1 answer
  • What message did vera mukhina convey in her work entitled the worker and the collective farmworker?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!