1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
puteri [66]
3 years ago
7

The vertical and horizontal scroll bars can be used to aid in navigation throughout the document. true or false

Computers and Technology
2 answers:
Triss [41]3 years ago
7 0

Answer: True

Hope this helps :)

Trava [24]3 years ago
5 0

TRUE,the vertical and horizontal scroll bars can be used to aid in navigation throughout the document.

<u>Explanation</u>:

A scrollbar is a modern technique for interaction or widget with which we are able to view  the content of file. Scrollbars allows to us to navigate  or move  in large volume of  information that extends the window border.The vertical  scroll bar allow to navigate towards top and bottom of the widow screen.

And the horizontal allow to navigate towards left and right side of the widow screen.Scroll bars are used  with the help of the mouse or keyboard or touch pad. The scrollbar has a scroll box which shows us that which part or portion of the document is being viewed currently.The size of this scroll box depends on the size of the document.

You might be interested in
What is the purpose of the backoff on Ethernet networks?
stellarik [79]

Answer: Please see below as the answer is self-explanatory.

Explanation:

In the original Ethernet standard, IEEE 802.3, the method used to deliver packets within a Ethernet network, is called CSMA/CD, and the acronym includes all the Ethernet features in brief.

Let's explain the different parts of the acronym.

CSMA= Carrier Sense Multiple Access.

This means that when any computer in the network (with no privileges for nobody) has a packet to transmit, it first "listen"if the network is idle. If it is the found condition, deliver the packet, and wait for an acknowledgement.

If past a given time, the ACK is not received, assumes that the packet was lost, due to a collision with another packet coming from another computer (this can happen because the packets don't travel instantaneously from one host to another, so one machine could have started to transmit before the another one could sense this fact).

This process is described by the other part of the acronym:

CD = Collission Detection

In order to avoid this type of problem, before trying to resend the packet, it waits some time, which is called "backoff".

This time increases exponentially each time that it is not possible to send a packet successfully, in order to try to find a moment in which finally the network be clear.

8 0
4 years ago
Where should broadheads be kept while traveling to and from the field? in a plastic bag to protect from moisture in a carrier at
saul85 [17]

Broadheads should be kept in a quiver with a cover while traveling to and from the field.

<h3>What is arrowhead?</h3>
  • The head or point of an arrow, which makes up the majority of the projectile's mass and is in charge of striking and piercing targets as well as serving other specific functions such as signaling, is frequently sharpened and hardened.
  • The first arrowheads were made of stone and organic materials; as human civilizations advanced, various alloy materials were used.
  • Projectile points are a type of arrowhead, which is an important archaeological artifact.
  • Modern enthusiasts still make over one million completely new spear and arrow points each year. A skilled craftsperson who makes arrowheads is known as an arrowsmith.
  • An arrowhead is a sharpened tip that was used as a hunting tool as well as a weapon during warfare.

To learn more about Broadheads, refer to:

brainly.com/question/1970236

#SPJ4

7 0
1 year ago
43
pshichka [43]

Answer:

c

Explanation:

5 0
2 years ago
Read 2 more answers
John have subscribed to a cloud-based service to synchronize data between your mobile device and your PC. Before allowing the da
xeze [42]

Answer: Mutual authentication

Explanation: Mutual authentication could be referred to a vetting process where the two entities in communication authenticate each other, it could also be referred to as a two-way authentication.

In the scenario above, the cloud service or server authenticates itself with the client and the client authentication itself with the cloud service server by verifying or vetting the certificates of both communicating entities before a secure encrypted connection would be established or created.

8 0
3 years ago
Read 2 more answers
Question 1(Multiple Choice Worth 5 points)
vlabodo [156]

Answer:

Information assurance

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Information assurance is a broad category that is typically used by cybersecurity or network experts to protect sensitive user information such as passwords, keys, emails, etc., in both digital and hard-copy forms

6 0
3 years ago
Other questions:
  • Which is the highest level of the hierarchy of needs model?
    5·2 answers
  • write a 〕ava program to sort a random list of 10 numbers entered b y user in an array using Selection Sort technique
    5·1 answer
  • What type of computer is likely to use so-dimms, have an internal power supply, and use a desktop processor socket?
    10·1 answer
  • How is it possible to find encyclopedias and reference texts on the internet
    11·2 answers
  • 2.7 code practice question 1 edhesive
    13·2 answers
  • If a filesystem has a block size of 4096 bytes, this means that a file comprised of only one byte will still use 4096 bytes of s
    8·2 answers
  • Consider we have n pointers that need to be swizzled, and swizzling one point will take time t on average. Suppose that if we sw
    11·1 answer
  • Select the correct answer from each drop-down menu. What is a distribution list and how is it selected?
    5·1 answer
  • Areas on which the development of the computer as a communication technology is based
    5·1 answer
  • Which of the following uses the proper syntax for creating an HTML comment?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!