1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hammer [34]
3 years ago
13

Uses of keyboard as a input device

Computers and Technology
2 answers:
mixas84 [53]3 years ago
8 0

The following are the uses of the keyboard as an input device.          

<u>Explanation</u>:

  • Keyboard has many uses. It is used on the computer, laptops, and mobile, etc. Without a keyboard, we cannot print anything on the screen.
  • The computer keyboard helps us to input characters on the screen. It helps us to type alphabets, numbers and special characters on the screen. With the help of keys, we can do net surfing and we can type letters and can play games.
  • In mobile, we can see the attached keyboard.  We are typing letters and doing calls with the help of a keyboard only. So without a keyboard, we can't type letters and we can't operate the system and mobile phones.                      
KATRIN_1 [288]3 years ago
3 0

helps us for typing letters, numbers and symbols etc.

You might be interested in
The ____ allows a core to communicate with other cpu components, such as the memory controller and other cores
Gnoma [55]
The appropriate response is Bus Interface Unit or BIU. The BIU gives different capacities, including era of the memory and I/O addresses for the exchange of information between outside the CPU, and the EU. 
The EU gets program direction codes and information from the BIU, executes these guidelines, and store the outcomes in the general registers. By passing the information back to the BIU, information can likewise be put away in a memory area or kept in touch with a yield gadget. Note that the EU has no association with the framework transports. It gets and yields every one of its information through the BIU.
4 0
3 years ago
python Write a program that will take a file named Celsius.dat that contains a list of temperatures in Celsius (one per line), a
jekas [21]

with open('celcius.dat', 'r') as fIn, open('fahrenheit.dat', 'w') as fOut:

   for line in fIn:

       fahrenheit = 9.0 / 5.0 * float(line) + 32

       fOut.write("%.1f\n" % fahrenheit)


You can control the number of decimals in the formatting clause in the write statement.

6 0
4 years ago
Cindy tried to delete a customer but the customer still had open invoices so the system would not allow her to delete the custom
Verdich [7]

Answer:

The answer is "Referential integrity".

Explanation:

This relates to one aspect of data integrity. Data across multiple tables are linked via relationships. In view of the distinct customer & invoice tables, each invoice table should have the primary key specified throughout the Customer table, for instance. Whenever the invoice table contains a customer ID reference. This ID including its customer will be only a table of the customer.

8 0
3 years ago
How do users log into Windows 8?
bogdanovich [222]
I think it’s swipe up if i’m correct, if not sorry
5 0
3 years ago
What is the number reason for conflict on a team?
Viefleur [7K]

Answer:

jvphcrx8cctiit9t9t9t

5 0
3 years ago
Other questions:
  • A type TW cable containing two No. 12 copper conductors has a maximum overcurrent protection of
    7·2 answers
  • _________ is the process of scanning the network to find out which Internet Protocol (IP) addresses are attached to potentially
    9·1 answer
  • Get these points why they hot!!!!!!!!!!!!!!!!!!!!
    14·2 answers
  • After you post a video of yourself defacing school property You can likely expect that
    11·2 answers
  • Insert the components that the computer uses to perform the tasks of each of the parts:
    13·1 answer
  • Question 2 (2 points)
    6·1 answer
  • You hash a symmetric key and store the hash on your workstation. You call your friend and verbalize the symmetric key to him or
    7·1 answer
  • Whenever you press a key, click the mouse or start an application, you're sending instructions tow
    9·1 answer
  • What legal protection would cover a person invention?
    10·2 answers
  • 4.8 code practice question 1 edhesive
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!