1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LekaFEV [45]
3 years ago
12

What is different between a pc mouse and a real mouse

Computers and Technology
2 answers:
alexandr1967 [171]3 years ago
8 0
Pc mouse is used for computers and use technology and a real mouse is alive like us and eat like us.
love history [14]3 years ago
6 0

Answer:

These two things are in no way similar.

First of all, a real mouse is a rodent. Which means that it is a living, breathing, mammal.

A PC mouse is an accessory to a computer. It is not living and will never be alive.

Please do not put a pc mouse in a cage and try to feed it.

You might be interested in
Quality answers will be appriciated! :)​
Naddika [18.5K]
<h2>1.</h2>

  1. F
  2. T
  3. T
  4. T
  5. F
  6. F
  7. T

________

<h2>2.</h2>

  1. A
  2. B
  3. D5*E5
  4. A

6 0
3 years ago
Read 2 more answers
TVBCA has just occupied an old historic building in downtown Pittsburgh in which 15 employees will work.
7nadin3 [17]

Answer:

A. The proposed solution delivers the required result and both optional desired results.

Explanation:

The IEEE 802.11a is the standard code of the wireless communication technology known as WIFI, it is wireless as it requires no cable to connect to a network device. The data transmission rate of the IEEE 802.11a is 1.5 - 54Mbps (mega bit per second). So, the employees in the TVBCA building can wireless connect to the network, which allows them to be mobile and they can also send large CAD files among themselves.

6 0
3 years ago
Select the correct answer.
tia_tia [17]

Answer:

A

Explanation:

HTML is a coding language.

8 0
3 years ago
There are three types of operators in BASIC-256 <br>a) True b) False​
Anestetic [448]

Answer:

a)True is the answer......

6 0
3 years ago
Is there an ethically acceptable reason to study and use the various attack methods described in this chapter? Can you think of
avanturin [10]

Answer:

Please see below  

Explanation:

Yes, there indeed is ethical justification for hacking certain computer systems. Since computer scientists are required to keep the system secure from external threats, so they make use of it when testing the network for potential loopholes that could make it vulnerable. It is beneficial in that it can help manifest the weaknesses present in the system, which can then be corrected for.

6 0
3 years ago
Other questions:
  • Write the definition of a function typing_speed, that receives two parameters. The first is the number of words that a person ha
    9·1 answer
  • On a Linux system, which command allows you to modify settings used by the built-in packet filtering firewall?
    15·1 answer
  • This loop is a good choice when you know how many times you want the loop to iterate in advance of entering the loop.
    14·2 answers
  • You are planning to install Windows 10 on a computer in a dual-boot configuration. The computer already has Windows 8 installed.
    14·2 answers
  • Each piece of evidence that is collected should be placed in a separate container true or false
    11·1 answer
  • What do we call the two parts of lift that goes down a mine
    7·2 answers
  • The total number of possible keys for des is _________, which a modern computer system can break in a reasonable amount of time.
    10·1 answer
  • 1. Trust can be built in a relationship if:
    15·1 answer
  • Which of these is a valid use of the Reply All feature?
    11·1 answer
  • Where is the third vanishing point in the three point perspective
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!