1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lina20 [59]
4 years ago
9

Which type of computing device is best suited to having a digital pen as an input device?

Computers and Technology
1 answer:
Rama09 [41]4 years ago
8 0

Answer: B. Personal Digital Assistant (PDA).

Although some of the other devices listed may have the capability of allowing the use of a digital pen, the use of the pen will be somewhat unnecessary. Let's take the personal computer and laptop for instance. In a personal computer and laptop we already have a mouse or track pad that can be used to navigate and select objects in the computer.

For the smart television, most smart televisions can actually be operated with gestures or voice command, the use of a digital pen will also not help due to the size of the screens of the televisions.

In the past we had some mobile phones that have a stylus as a pointer. This type of technology has now been change to touch screens that are more effective for the different types of mobile being produced now a days.

Most PDA's come with a screen that requires a small amount of pressure to activate commands. Digital pens also come with different functions that allow the device to draw, record audio, and even shortcut commands for these devices. These digital pens input are then converted by device and translated into computer language.

You might be interested in
Choose the reasons why Windows Server operating systems are a popular choice for a network because they _____. Select all that a
solong [7]

Answer:

Windows Server operating systems are a popular choice for a network because they use wizards and setup devices as the user operating system, making it easier to set up network features work on networks that include using Windows operating systems as well as Mac OS, NetWare, or UNIX

Explanation:

Windows operating system is popular than any other operating system for certain reasons:

1. It provides GUI feature which any layman can access and learn easily

2. The compatibility that it provides makes it more popular

3. It supports most of the software program available in the market

4. The design of Windows is more comfortable when compared to other open source operating system.

Only thing is that it is not a free-ware. Licence needs to be purchased to use it.

6 0
4 years ago
Which of the instances below is an example of a Trojan horse? Question 2 options: a) An attachment in an email that is really a
sergij07 [2.7K]

Game-theif Trojans is the malware that makes a backdoor into your email account by which you are playing a game or has downloaded it and thus by this all information of user is exposed.

So option D is the answer.

Option A cannot be answer because Trojan does not use files for its purpose.

Option B cannot be a good option because Trojan works in online could.

Option C cannot be a option because Trojan does not need executable to attack your account.

3 0
3 years ago
Read 2 more answers
You have just changed the system time within your computer's BIOS. You choose to save the settings upon exit. What happens next
vazorg [7]
The system reboots with the time changed
8 0
3 years ago
Read 2 more answers
What is a specific challenge faced by information visualization researchers who are building an interface?
Mkey [24]

Answer:

 Information virtualization is the process of representing the abstract data such as numeral number and text into the form of visual which is human can easily understand.

The main challenges faced by the information visualization researchers are:

  • The main challenge which are faced by the information virtualization is during the data importing and also cleaning in the system.
  • It also not able to access the large amount of the data easily from the system.
  • Due to the poor selection of the scale and the coordinate rotation it also lead to the data distortion.
3 0
3 years ago
Kelli is unable to find a shape that meets her needs. Which feature in PowerPoint should she use to create shapes that are compl
Damm [24]

Answer:

this will be okay but if this does not match with her needs then she can create her own picture to match

6 0
3 years ago
Other questions:
  • Which of the following applies to a DNS caching server? (Choose all that apply.)
    6·1 answer
  • In a ____________________ attack, the attacker sends a large number of connection or information requests to disrupt a target fr
    14·1 answer
  • You share a number of files from your computer, and you've received a number of calls from users who say they can't connect to t
    5·1 answer
  • In a folder hierarchy, the top level is referred to as which of the following?
    7·1 answer
  • ____ is an approach to boundary spanning which results from using sophisticated software to search through large amounts of inte
    5·1 answer
  • How we can load program on the browser window.​
    7·2 answers
  • Tanya wants to include an instructional video with all its controls on her office website. The dimensions of the video are as fo
    10·1 answer
  • What is the default return type of a method in Java language?
    9·2 answers
  • What are the missing words in the program?<br> divide(numA,numB):<br> numA/numB
    9·2 answers
  • Writea SELECT statement that uses the ranking functions to rank products by the total quantity sold. Returnthese columns:The pro
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!