1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ksivusya [100]
3 years ago
15

Which of the following operation is not performed by a mouse 1) left click , middle click , right click, double click​

Computers and Technology
2 answers:
agasfer [191]3 years ago
3 0

Answer:

middle click

Explanation:

hope it helps

luda_lava [24]3 years ago
3 0

Answer:

middle click

Explanation:

because in the middle it has a scroll

You might be interested in
How did transistors revolutionize the world of computers?
Marizza181 [45]

Answer:

Transistors transformed the world of electronics and had a huge impact on computer design. Transistors made of semiconductors replaced tubes in the construction of computers. By replacing bulky and unreliable vacuum tubes with transistors, computers could now perform the same functions, using less power and space.

3 0
3 years ago
Which of the following statements is true?
Sonbull [250]

Answer:

C

Explanation:

Predicate methods typically test a condition and do not modify the object on which they're called.

6 0
3 years ago
You are tasked with securing a small network for a client in which the following requirements must be met: If a user on the priv
nalin [4]

ANSWER:

E

EXPLANATION:

myHostname = window.location.hostname;

var myTLD = "." + myHostname.substring(myHostname.indexOf("wupload") + "wupload.".length).split(".")[0];

function afterLoad() {

 return

}

ieFixForFileSelectionOnChangeEventTimer = null;

function ieFixForFileSelectionOnChangeEvent(a) {

 $("#siteName").toggle();

 if ($("#inputFileSelection").val() == "") {

   ieFixForFileSelectionOnChangeEventTimer = setTimeout("ieFixForFileSelectionOnChangeEvent()", 200)

 } else {

   $("body")[0].focus()

 }

}

function urlencode(a) {

 return escape(a.toString().replace(/%/g, "%25").replace(/\+/g, "%2B")).replace(/%25/g, "%")

}

$(document).ajaxStart(function() {

 $("body").addClass("ajaxLoading")

});

$(document).ajaxStop(function() {

 $("body").removeClass("ajaxLoading")

});

$(document).ajaxError(function(d, c, a, b) {

 CMApplication.Widgets.Dialog.close();

 CMApplication.Widgets.Dialog.displayMessage(c.responseText, CMApplication.Widgets.Dialog.Types.exception)

});

jQuery.setCookie = function(b, c, a) {

 var d = new Date();

 d.setDate(d.getDate() + a);

 cookieDomain = ".wupload" + myTLD;

 document.cookie = b + "=" + escape(c) + ((a == null) ? "" : ";expires=" + d.toUTCString() + "; path=/;domain=" + cookieDomain + ";")

};

jQuery.getCookie = function(a)

4 0
4 years ago
How can you tell the value of a purchase?
ZanzabumX [31]
Look at the price tag
find the item on ebay to see what other are selling it for


8 0
3 years ago
A ____ attack is much more substantial than a DoS attack because of the use of multiple systems to simultaneously attack a singl
victus00 [196]

Answer: (D) Distributed denial- of- service (DDoS)

Explanation:

The distributed denial of service attack is one of the type of attack that occur when the multiple system are basically flooded with the resources and the bandwidth.

  • Botnet is one of the example of DDoS as it caused the DOS (denial of service) for the users.
  • This type of attack is more substantial as compared to the DoS attack as they use the multiple system for attack the single target simultaneously.

Therefore, Option (D) is correct.

8 0
4 years ago
Other questions:
  • If your vehicle catches fire while you are driving, you should:
    5·2 answers
  • You are out on the water. you do not understand what another boater intends to do. what sound signal should you make?
    14·1 answer
  • A book of the Law was found in the Temple, which was being repaired, during what year of Josiah's reign.
    15·2 answers
  • Prewritten, commercially available sets of software programs that eliminate the need for a firm to write its own software progra
    5·1 answer
  • You have three users who travel to four branch offices often and need to log on to the RODCs at these offices. The branch office
    12·1 answer
  • 3. Which of the following is called address operator?<br> a)*<br> b) &amp;<br> c).<br> d) %
    12·1 answer
  • A device that make it possible for a muitiple customer to share one address is called
    13·1 answer
  • What is 3x10? PLZZZZZ
    11·1 answer
  • Any my hero academia fans out there don't report at all just what more friends to
    14·2 answers
  • 9. These particular machines can be decentralized.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!