1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Shalnov [3]
3 years ago
12

What are the basic Mouse actions called and how are they executed

Computers and Technology
1 answer:
Nata [24]3 years ago
6 0
The left side is a shortcut for 'Enter' the small wheel in the middle is used to scroll your view of the object,The right is used to intialize options pop-up to edit or initiate commands of the intended target


You might be interested in
What is the significance of the following terms A A L U control unit in the CPU​
WARRIOR [948]

Answer:

Explanation:

The function of ALU is to perform arithmetic operations(add,subtract, multiply,division) as well as logical operations(compare values).

The function of CU is to control and coordinate the activities of the computer.

8 0
3 years ago
You just read an msds for acetic acid. based on what you read, what type of information is included in an msds sheet? record you
victus00 [196]
There's alot of information included in the MSDS sheet, for example the company who owns the acid, the composition of the ingredient, the hazards this may cause and how to stop them, first aid measures, and fire fighting measures, just to name a few. This sheet gives you all the information you need to be safe while working in the lab with different chemicals. 
3 0
4 years ago
What type of system security malware allows for access to a computer, program, or service without authorization?
olasank [31]

Answer:

"backdoor" is the correct answer for the above question

Explanation:

  • The backdoor is a type of attack which is done by the type of backdoor programs to remotely access the computers without the authorization of the user of the computer.
  • It is inserted on the computer with the help of the internet and accessed the computer without using authorization techniques.
  • The above question asked about the virus which is used to access the computer without the permission of the right use of the system. Hence the answer is backdoor which is defined above.
7 0
4 years ago
7+9 help me pleas i dont know help now
natali 33 [55]

Answer:

16

Explanation:

because it is

4 0
2 years ago
Read 2 more answers
Which degree is usually required for librarians who manage library holdings and assist patrons with book, periodical, and comput
IRISSAK [1]

i think C

help from Russia


6 0
3 years ago
Read 2 more answers
Other questions:
  • 11. In Microsoft Word, when you highlight existing text you want to replace, you're in
    8·1 answer
  • What is Administrator windows 10
    8·1 answer
  • You modify a document that is saved on your computer. Where are the changes stored until you save the document?a. Radom access m
    15·1 answer
  • Give an example of movies or games that use teleportation
    11·1 answer
  • What are the 6 external parts of a computer system
    5·1 answer
  • Translate function f into RISC-V assembly language. Assume the function declaration for g is int g(int a, int b). e code for fun
    10·1 answer
  • When you need to cut new external threads on a bolt, which of the following tools should you use?
    9·2 answers
  • Plsss help me plsssssss
    11·1 answer
  • Write a program that will ask the user for three different numerical values. The program should then decide whether the values a
    13·1 answer
  • What type of movement does the output produce
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!