1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SCORPION-xisa [38]
3 years ago
9

List THREE different types of mouse:​

Computers and Technology
2 answers:
vodomira [7]3 years ago
8 0

Answer:

trackball mouse, optical mouse, and wireless optical mouse

Gemiola [76]3 years ago
8 0

1 Trackball mouse are old technology mouse that has mechanical movement of ball inside. That ball moves along the movement of mouse. Cons: Dust can easily block the mechanical movement of mouse inside ball

2 Optical mouse are the mouse having infrared sensitivity technology these mouse are being used these days. It's pros are no dust can enter and block the movement of mouse like trackball mouse if dust gone inside ball will block the ball. Cons: some mouses have Sensitvity issues using in some crippled surface.

3 Wireless optical mouse: These mouse comes with Bluetooth technology that can be used long range having no issues of wire tangle. It is the same infrared sensitivity technology used in this too that is in optical mouse. Only the difference is it is wireless. Pros: Can use the mouse in distant without having wire tangling issues. Cons: same as said in second option crippled surface infrared sensitivity issue.

You might be interested in
What is the best programing language to use for building video games?
Alexxandr [17]

hey

I'm going to college for game design.

one of the best languages and the one I'm studying in is c# it is used in unity and many other game engines but there are many more. Just to list a few c++, Java, and many more it is up to you. if you would like more info about this just let me know By the way what game are you planning to make that is one of the most important factors

Hope this helps

-scav

6 0
3 years ago
One of the most toxic components of a computer is the
Cloud [144]
The most common is usually lead found in the glass or some circuits in rare cases
6 0
3 years ago
C2.5 - A group of four pirates has a treasure chest and one unique lock and key for each pirate. Using hardware that is probably
slavikrds [6]

Answer:

Explanation:

All the pirates uses their individual key and lock for the locking down of each the four sides of the lid of to the chest. Among the pirates, if three of them decides to open their latches, they can be able to lift the top by essentially using the fourth (locked) latch as a hinge to open the top. (We have several solutions or ways to do this.)

3 0
3 years ago
Who were 4 major people that attended the constitutional convention
postnew [5]
Alexander Hamilton, George Washington, James Madison, and Benjamin Franklin
7 0
4 years ago
Your company deals with highly confidential information, some of which is transmitted via email among employees. Some documents
S_A_V [24]

Answer: AD RMS(Active Directory Rights Management Services)

Explanation: Active Directory Rights Management Services (AD RMS) is the tool for security that provides the protection of data .The security of data is maintained by the policies and regulation of data accessing that are implemented on data .

The working of the AD RMS is based on the RMS applications which encrypts the document and generates the regulation and stamp to collect them in an individual files.This helps in protecting the information that being created and consumed.

7 0
3 years ago
Other questions:
  • If you don't know whether to write too, two, or to, you should use the spell-checker to help you decide. true or false?
    7·1 answer
  • . Write a recursive function names factorial to compute the factorial of the parameter. Also write the main function, where you
    15·1 answer
  • A collection of information stored in an electronic format that can be searched by a computer.
    14·1 answer
  • A device (or a software program on a computer) that can monitor data traveling on a network is known as a socket sniffer. ______
    15·1 answer
  • Working together, printer A and printer B would finish the task in 24 minutes. Printer A alone would finish the task in 60 minut
    8·1 answer
  • rray testGrades contains NUM_VALS test scores. Write a for loop that sets sumExtra to the total extra credit received. Full cred
    5·1 answer
  • What are the two types of computer keyboards and how are they different?
    6·2 answers
  • Select three advantages of cloud computing.
    12·1 answer
  • Will this website ever get itself together to stop people from sending links?
    9·1 answer
  • What is a zerø-day exploit? No go.ogle >:(
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!