1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
murzikaleks [220]
3 years ago
5

How do u type faster

Computers and Technology
1 answer:
eduard3 years ago
5 0

Answer:

by learning the right home keys and how to place the fingers

Explanation:

the left hand side : A,S,D,F

the right hand side: :, L, K, J

the two little fingers are guide keys

guide keys: letter A and column

You might be interested in
What type of collection is created with each assignment statement?
lilavasa [31]

Answer:

tuple

Explanation:

at first its a dictionary but then it is reassigned to a tuple

don't forget tuples are immutable

7 0
2 years ago
which of the following is an educated or informed guess that is proposed and supported with verifiable evidence
beks73 [17]

The answer is Hypothesis.  It is something more than just a wild guess but less than a well-established theory, a theory which can be tested through study and experimentation..  They are assumptions generally believed to be true. They are provisionally accepted in order to interpret certain events or phenomena, and to provide guides for further study.

6 0
2 years ago
At what layer of the osi model does a network switch normally operate?.
Iteru [2.4K]

Answer:

A network switch is a multiport network bridge that uses MAC addresses to forward data at the data link layer (layer 2) of the OSI model.

I hope this helps you :)

5 0
2 years ago
A security risk to email is​ __________, which are fraudulent messages that prompt unwary users to reveal sensitive information
d1i1m1o1n [39]

Answer:

Option C is the correct answer for the above question.

Explanation:

Pishing is a type of attack which is used by the attacker to access the secured information from the system. It is used by the third person assuming for the system that he is the right use of the system and can access the information of the system.

The above question asked about the attack which can access the information to assume that he is the right user and give accessed to the network to been hacked. So the answer is phishing which is described above. Hence option C is the correct while the other is not because:-

  • Option A states about direct mail which is not a type of attack.
  • Option B states about instant messaging which is also not a type of attack.
  • Option D states about spam which is used to send the spam messages.
  • Option 'E' states about the mass mail which is used to send the lots of spam mail.
5 0
2 years ago
Who goes to belle place middle and is in 7th grade on hear​
SashulF [63]

Answer:

Not me but thx for the free points lol

Explanation:

3 0
3 years ago
Other questions:
  • ______ is the software that blocks a user from being able to access your computer.
    9·1 answer
  • Maggle is preparing a document. She wants to open the help menu to sort out a formatting problem. Which key should she press to
    11·1 answer
  • Nonverbal communication includes _____.
    9·2 answers
  • Before you can use a navigation control, you must _____. A. configure the web.config B. configure the global.asax C. configure t
    5·2 answers
  • It needs to be as simple as possible. Each question is slightly different.1. An arithmetic progression is a sequence of numbers
    7·1 answer
  • I can’t wait Till Miya’s anniversary skin To be released on september 21st
    6·1 answer
  • What is an operating system that controls some aspects of the computer?
    10·2 answers
  • Assume the user types in 7 for x and 2 for y. What is output by the
    6·1 answer
  • The technique that allows you to have multiple logical lans operating on the same physical equipment is known as a.
    6·1 answer
  • An independent penetration testing company is invited to test a company's legacy banking application developed for Android phone
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!