1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
chubhunter [2.5K]
3 years ago
7

Which finger presses the H key on the keyboard? index finger on the left hand pinky finger on the right hand index finger on the

right hand thumb on the left hand
Computers and Technology
2 answers:
nikklg [1K]3 years ago
6 0

Answer:

C

Explanation:

SVETLANKA909090 [29]3 years ago
4 0
<h2>The Answer is C) Index finger on the right hand</h2>

When you put your hands on the keyboard, your index fingers should be touching the j and the f key, and right next to the j key is h, which you would be pressing with the index on your right hand.

You might be interested in
____ allows someone browsing the internet to click on words or phrases, enter his or her phone number, and continue browsing
Sphinxa [80]
It is the internet callback technology that allows someone browsing the internet to click on words or phrases, enter his or her phone number, and continue browsing. It is a technology that enable one to browse the Internet to cue on a certain website to have a representative call a certain number.<span />
6 0
3 years ago
Read 2 more answers
,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
scoray [572]
,,,,,,,,,,,,,,,,,,,,,,
4 0
3 years ago
If you give someone ______ to your device, they can control it through another phone or computer.
icang [17]

If you give someone <u>Remote access </u>to your device, they can control it through another phone or computer.

<h3>What is  Remote entry?</h3>

An authorized user can use remote access to connect to a computer or network from a different location using a network connection. Users can connect to the systems they require through remote access even if they are physically far away.

Therefore, the dangers to remote access are:

  • There is a risk of device loss or theft due to a lack of physical security safeguards.
  • as the data is transmitted through a public internet, eavesdropping.
  • unapproved access to systems or data, possibly while oblivious to the screen.
  • If someone gets access to the gadget, they could watch and change the data.

Learn more about Remote access from

brainly.com/question/28900477
#SPJ1

5 0
2 years ago
What is a common indicator of a phishing attempt cyber awareness 2022
vivado [14]

There are several types of malicious document. A common indicator of a phishing attempt cyber awareness 2022 is that It includes a threat of dire circumstances.

  • Phishing attacks often makes use of email or malicious websites to infect the machine with malware and viruses so as to collect personal and financial information.

Cybercriminals often uses different means to lure users to click on a link or open an attachment that infects their computers thereby producing vulnerabilities for criminals to use to attack.

Learn more from

brainly.com/question/24069038

7 0
3 years ago
___________ are the constant values that are used in a program. ​
77julia77 [94]

Answer: Data

Explanation:

3 0
3 years ago
Other questions:
  • Progressively enhancing a web page for different viewing contexts (such as smartphones and tablets) through the use of coding te
    11·1 answer
  • What is last mile in VOIP
    13·1 answer
  • The device used to attach a microphone to a lectern is called a ____.
    10·1 answer
  • What does API stand for
    7·2 answers
  • 50 POINTS &amp; A FOLLOW!
    11·2 answers
  • )In a vector implementation of a stack ADT, you add an entry to the top of a stack using which vector method?
    13·1 answer
  • Quality of service (QoS) is a technology that allows a network design to strategically optimize network performance for select t
    8·2 answers
  • Which statement describes what happens when a user configures No Automatic Filtering in Junk Mail Options?
    5·1 answer
  • _____ use patterns to find solutions instead of using the if-then-else rules that expert systems use.
    13·1 answer
  • How to add up multiple user inputs for example: If i ask the user How many numbers do you want to add? they say 5 then i out put
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!