1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuki888 [10]
3 years ago
15

The computer mouse are used for

Computers and Technology
2 answers:
sdas [7]3 years ago
8 0

A computer mouse is an input device that is most often used with a personal computer. Moving a mouse along a flat surface can move the on-screen cursor to different items on the screen. Items can be moved or selected by pressing the mouse buttons (called clicking). It is called a computer mouse because of the wire that connects the mouse to the computer. The people who designed the first computer mice thought that it looked like the tail on a mouse. Today, many computer mice use wireless technology and have no wire. On most computers, the user can move the mouse to move the cursor in the same direction. To choose something that is on the screen, the user can move the cursor to it and "click" the left mouse button. The right mouse button is used to open menus that are different depending on where the cursor is. The other mouse buttons can do different things, depending on the software. Most mice have two buttons to click. Most mice also have a "scroll wheel"—a small wheel found between the two main mouse buttons. The user can move the wheel back and forth to "scroll" through things like a website or folder. "Scrolling" means moving the words or pictures up or down on the screen, so another part of the page comes into view. The wheel can also be pressed, to click it like another button.

IgorC [24]3 years ago
5 0
A computer mouse is an input device for a computer that provides information onto the x and y coordinates of the icon being moved around by this mouse (referred to as a cursor) based off of the hand movements of the user moving the mouse.
Mouses also have three other button inputs. These are the left, right, and middle mouse buttons. The left button is typically used as the primary button, and is used to select, drag, open, and similar function. The right mouse button is usually intended for opening menus for additional options to be performed by the program being right-clicked on. The middle mouse button is actually a wheel that is used to move pages that extend beyond the boundaries of your screen up and down for easier viewing.
Hope that helped! =)
You might be interested in
What is a URI (include example)
fenix001 [56]

Answer:

 URI is the uniform resource identifier and it is basically a sequence of the character which identify the physical and logical resources. The uniform resource identifier basically contain the predefined set of rules and syntax and also maintain the extensibility hierarchical schema.

There are basically two types of URI that are:

  1)  Uniform Resource Name (URN)

  2) Uniform Resource Locator (URL)

For example: HTTP protocol , file transfer protocol (FTP).

 

6 0
3 years ago
________ are the primary means of authentication for a user's computer and other networks and servers to which the user may have
inn [45]

Answer:

The answer to this question is "Password".

Explanation:

In computer science, any User's computer and networks and server is secured with the password to access all we use the password. for example, if we want to access any WiFi system or any User's computer. Then we will insert the password. If the password is wrong so we can't access the WiFi system or User's computer. similarly, If we want to access any server so we must know about the password. Then we use the server and change it's setting.

So the password is the primary means of authentication for all User's.  

4 0
3 years ago
A bulb has a resistance of 15Ω and is rated at 3A. What is the maximum voltage that can be applied across the bulb?
Anastasy [175]

Answer:Wheres the option choice??????????????????????

Explanation:

7 0
2 years ago
What is the name of the virus that appears to be a legitimate program?
timurjin [86]
A virus or malware appearing/pretending to be a legitimate program is called a Trojan. 
3 0
3 years ago
Which of the following sets of data would be presented best in a histogram.
anastassius [24]
I do not believe you answer is right. I believe it would be B the average montly sales for the big toy company. Only documenting the last month is not enough information to make a histogram, and a histogram asks for information based on one subject not multiple subjects. Asking for the number of each type of candy sold last month would make a normal graph comparing the difference in how much each candy sold, so your answer should be B.
3 0
3 years ago
Other questions:
  • Suppose a computer can execute 1 billion instructions/sec and that a system call takes 1000 instructions, including the trap and
    10·1 answer
  • Bob received a message from Alice which she signed using a digital signature. Which key does Bob use to verify the signature?Gro
    13·1 answer
  • What are the different components of the cloud architecture?
    5·2 answers
  • Imagine your friend wants to apply
    5·1 answer
  • After you select a cell with an error indicator, you can click the error checking _______ to display additional information abou
    14·1 answer
  • Text can be easily moved from one location to another using _____.
    15·1 answer
  • Supports traditional transactional processing for day-to-day front-office operations or systems that deal directly with the cust
    11·1 answer
  • What is a feature of readable code?
    12·2 answers
  • When do you use an else statement?
    10·1 answer
  • Which of the following helps you plan out every step of an animation?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!