1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AlexFokin [52]
3 years ago
15

A user complains that his new mouse doesn't work right. He has an old system at home and when he has had this problem, he cleane

d the ball on the underside of the mouse to fix it, but this mouse doesn't have a ball on the underside. What can you tell him about his mouse?
A) the ball must have fallen out
B) the ball is hidden under an access panel on new mice
C) the mouse is an optical mouse
D) the mouse uses sonar to detect movement
Computers and Technology
1 answer:
topjm [15]3 years ago
4 0

Answer:

the mouse is an optical mouse

Explanation:

The user's mouse does not have a ball to be cleaned when it does not work right because he or she is using an optical mouse. This type of mouse does not use the old-ball-system, but rather uses a light source, which usually consist of a light detector and a light-emitting diode, and this set-up ensures that movement is detected relative to a surface and hence the cursor is moved too.

You might be interested in
where element is the Hypertext Markup Language (HTML) element and _____ pairs define the styles that are applied directly to tha
frez [133]
Not too sure what the answer the question would expect, or rather what terminology,

But I’d say key-value pairs

For example in CSS

key: value;

color: green;
3 0
2 years ago
Which type of security personnel may work for government as well as for private security agencies?
monitta

Answer: A security guard

Explanation:

3 0
3 years ago
Read 2 more answers
HELP ME PLEASE
MAXImum [283]

Explanation:

Threats

Computer Security Threats are possible dangers that can affect the smooth functioning of your PC. These may be a small piece of adware or a harmful Trojan malware. In the present age, computer security threats are constantly increasing as the world is going digital. computer security threats

Types of Computer Security Threats

There are several types of computer security threats such as Trojans, Virus, Adware, Malware, Rootkit, hackers and much more. Check some of the most harmful types of computer Security Threats.

COMPUTER VIRUS

A Computer Virus is a malicious program, which replicates itself and infects the files and programs of your PC and can make them non-functional.

COMPUTER WORMS

A self-replicating computer program that spreads malicious codes, computer worms make use of the network to send copies of the original codes to other PCS. It can also go to the extent of sending transferring documents utilizing the email of the user.

SCAREWARE

Scareware is a malware that tricks victims to buy software by displaying fake virus alerts. A scareware infected PC may get pop-ups of fake malware threats and to get rid of those, users are prompted to purchase a fake anti-malware software.

KEYLOGGER

Also known as a keystroke logger, Keyloggers can track the real-time activity of a user on his computer. Keylogger runs in the background and records all keystrokes made by a user and passes the information to the hacker with the motive to steal password and banking details.

ROOTKIT

A rootkit is considered extremely dangerous as they appear to be legitimate files and deceives the computer user. Rootkit masks viruses and worms and makes them appear as necessary files. These are very difficult to remove and only an antivirus with the anti-rootkit feature can remove a rootkit.

Tips for Best Computer Security

For best computer security, you must follow certain guidelines, which are also called computer best practices. 1. Use the best antivirus software, which not only provides protection to your PC but also internet protection and guards against cyber threats. 2. Do not download untrusted email attachments and these may carry harmful malware. 3. Never download software from unreliable sites as they may come with a virus that may infect your system as soon as you install the software.

4 0
2 years ago
An electronic device that can accept data as input, process it according to a program, store it, and produce information as outp
anzhelika [568]
The correct answer would be a Computer
6 0
3 years ago
A bakery sells three types of muffins whose prices are as follows: 1- blueberry muffin, $2.98 2- chocolate chip muffin, $4.50 an
andreev551 [17]

Explanation:

The menu is provided as given in the question. A while loop is used to keep getting input from the user until the user enters exit value 0. If elif commands are used to keep track of the respective muffins. Three counters are used to keep the count of each muffin and at the end the quantity of each muffin is multiplied with the price of each muffin then added together to get the total bill.

Python Code:

menu="""****************MENU*******************

Please select your muffins:      

Press 1 for blueberry muffin $2.98      

Press 2 for chocolate chip muffin $4.50

Press 3 for banana muffin $9.98        

Press 0 for exit!                

***************************************"""

print(menu)

blue=0

chock=0

banana=0

flag=0

while flag==0:

   inp=eval(input())

   if inp==1:

       blue+=1

       print("blueberry muffin added")

   elif inp==2:

       chock+=1

       print("chocolate muffin added")

   elif inp==3:

       banana+=1

       print("banana muffin added")

   elif inp==0:

       break

   else:

       print("invalid selection!")    

print("Your bill is: $",blue*2.98+chock*4.50+banana*9.98)

Output:

*******************MENU**********************

Please select your muffins:      

Press 1 for blueberry muffin $2.98      

Press 2 for chocolate chip muffin $4.50

Press 3 for banana muffin $9.98      

Press 0 for exit!

***************************************"*********

2

chocolate muffin added

3

banana muffin added

5

invalid selection!

1

blueberry muffin added

0

Your bill is: $ 17.46

7 0
4 years ago
Other questions:
  • Let L be any r.e. language. We know that there is an unrestricted grammar for L. Show that L can be generated by an unrestricted
    10·1 answer
  • If you attempt an edgeunity quiz is your latest attempt the one counted?
    10·1 answer
  • Each professional association has
    7·1 answer
  • What is distribution hardware?
    14·1 answer
  • Why is know app downloading in my android phone even if I have 900 MB ???
    8·2 answers
  • What animal does maleficent transform into in order to defeat prince phillip?
    13·2 answers
  • A student is having trouble finding enough time in his busy schedule to work on his school science project. He has a demanding s
    5·2 answers
  • Which of the following is an example of a sales promotion?
    7·1 answer
  • Why is it important for organizations to make strong commitment to Cloud at scale?
    14·1 answer
  • What is containment and why is it part of the planning process
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!