1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vedmedyk [2.9K]
3 years ago
11

To move the insertion point to another location on the screen, users can use: the clipboard click to type arrow keys scroll bars

Computers and Technology
1 answer:
slega [8]3 years ago
5 0

Answer:

arrow keys

Explanation:

duh

You might be interested in
Arrange the tiles in the order of communication in the linear model.
IceJOKER [234]

Answer:

  • A sender sends a message through a transmitter.
  • The transmitter converts the message into a signal through encoding.
  • The encoded signal then travels through a channel.
  • At the receiver, the signal is decoded.
  • The decoded message is sent to the destination.

Explanation:

The linear model of communication comprises of four (4) main components and these are;

1. Sender (S): this is typically the source of information (message) or the originator of a message that is being sent to a receiver. Thus, they are simply the producer of a message.

2. Channel (C): this is the medium used by the sender for the dissemination or transmission of the message to the recipient. For example, telephone, television, radio, newspapers, billboards etc.

3. Message (M): this is the information or data that is being sent to a recipient by a sender. It could be in the form of a video, audio, text message etc.

4. Receiver (R): this is typically the destination of information (message) or the recipient of a message that is being sent from a sender.

The order of communication in a linear model are;

I. A sender sends a message through a transmitter.

II. The transmitter converts the message into a signal through encoding.

III. The encoded signal then travels through a channel.

IV. At the receiver, the signal is decoded.

V. The decoded message is sent to the destination.

Generally, when a message is encoded by the sender, it requires a recipient to decode it for the communication process to be complete.

5 0
3 years ago
how do you know if you passed your freshman year and are promoted to a sophomore status? I need a 100% accurate answers from I g
AlekseyPX
As long as you received the credits for every core class you have become a sophomore
4 0
3 years ago
I need help I’m so behind
Elina [12.6K]

i would say true man i hope that you pass you quiz/test and have great rest of your day -w-

4 0
3 years ago
On a Windows network share, if the user can browse a file but cannot copy or modify it, what type of access controls and permiss
melamori03 [73]

Answer:

List Folder Content.

Explanation:

When there is a List folder Content permisoon, one can list files in the folder or switch to a subfolder, view folder attributes and permissions, and execute files, but cannot view file contents.

Cheers

8 0
3 years ago
Read 2 more answers
An examination of how well a particular solution is supportable given the organization’s current technological infrastructure an
san4es73 [151]

Answer:

Technical Feasibility is the correct answer of this question.

Explanation:

Examining how well a specific approach can be supported given the current technological infrastructure and resources of the company, including hardware, software, networking and personnel, is known as technical feasibility.

A technological feasibility report explores the specifics of how you plan to supply a goods or services to clients.It the strategic or operational strategy of where the company manufactures, sells, supplies and monitors its goods or services.

6 0
3 years ago
Other questions:
  • What is an efficiency target? Give an example of setting an efficiency target
    11·1 answer
  • Assuming that data mining approaches are to be used in the following cases, identify whether the task required is supervised or
    12·1 answer
  • The _____ feature automatically corrects typing, spelling, capitalization, or grammar errors as you type them.
    13·1 answer
  • Which files have not been processed by your camera or computer?
    13·1 answer
  • Which expression correctly determines that String s1 comes before String s2 in lexicographical order
    6·1 answer
  • Which of the following is a major difference between XSS attacks and remote code exploits?
    15·1 answer
  • A logistics company's vulnerability scan identifies the following vulnerabilities on Internet-facing devices in
    8·1 answer
  • What is the function of ctrl+Q​
    14·1 answer
  • Difference between private and confidential data?​
    5·1 answer
  • Explain why this product was created?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!