1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
const2013 [10]
3 years ago
6

In the mouse properties window you can

Computers and Technology
1 answer:
Nikitich [7]3 years ago
4 0
When u are in the mouse properties window you can change the speed in which your pointer moves, change the speed of your double click on the mouse, change the look of the pointer make the pointer automatically move to default button in a dialog box have the pointer hide while you are typing. and change the number of lines that the scroll wheel will move when using it. there's actually a lot of optoons available in the mouse properties window. HOPE I WAS HELPFULL
You might be interested in
QUESTION 5
lesya692 [45]
I’m pretty sure D but it should be like $B2
8 0
2 years ago
Compter History Large Resume Include: the beginnings of the computer and its development during the years The events of computer
NikAS [45]

Answer:

The development of computers from the beginning to what we see now is called the computer generations. It is gradual advancement in the technology in the making of the computer.

Explanation:

The generation in computer technology can be defined as the development or the change in the technology in the computer as it was used. There were  five generations of computer development. They were :

1. First Generation computers

   In this generation, vacuum tubes was used in the circuits. It dated from 1946 to 1959.

2. Second Generation computers

  These are transistors based computers. This generation ranges from 1959 to 1965.

3. Third Generation computers  

    This generation computers were Integrated circuit based. The generation stared in 1965 and ended in 1971.

4. Fourth Generation computers

   The computers of this generation used VLSI microprocessor in the circuits. The period of the 4th generation computers are from 1971 to 1980.

5. Fifth Generation computers

   The computers of this generation used ULSI microprocessor in the circuits. The 5th generation computers started from 1980s.

4 0
2 years ago
Roger is part of a team that is responsible for employing a new information system, the design of which was developed using cust
antoniya [11.8K]

Answer:

A line with a diamond on one end

Explanation:

A line with a diamond on one end is used as a symbol for condition.

In a structured programming chart, condition represents the fact that one program module (a control module) determines subordinate modules that will be invoked.

5 0
3 years ago
Your development server is experiencing heavy load conditions. Upon investigating, you discover a single program using PID 9563
Slav-nsk [51]

Answer:

Your development server is experiencing heavy load conditions. Upon investigating, you discover a single program using PID 9563 consuming more resources than other programs on the server, with a nice value of 0. What command can you use to reduce the priority of the process

while you should press f3

Explanation:

5 0
3 years ago
What is a boolean operator?
VLD [36.1K]
2. Search parameters set to identify specific information during internet searches
7 0
2 years ago
Other questions:
  • What type of Windows Server is the most likely server to be targeted by a computer hacker?
    13·2 answers
  • To begin importing data from an excel spreadsheet, click on the ____ tab on the ribbon.
    11·1 answer
  • How do you do this question
    11·1 answer
  • Which of the following is not a shared characteristic of new media.
    8·1 answer
  • What is the difference between the paste and paste special options
    8·1 answer
  • The following program is supposed to display a message indicating if the integer entered by the user is even or odd. What is wro
    13·1 answer
  • Where is information stored in the computer?​
    9·1 answer
  • how risk can impact each of the seven domains of a typical IT infrastructure: User, Workstation, Local Area Network (LAN), Local
    7·1 answer
  • How many total bits are required for a direct-mapped cache with 128 blocks and a block size of 8 bytes, assuming a 4GB main memo
    15·1 answer
  • Which of the following are safety guidelines when socializing online?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!