1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andre45 [30]
3 years ago
10

(1)similarities between backspace key and delete key. (2) different between backspace key and delete key. (3) explain the term e

rgonomics. (4) explain the following. a click b right click c double click d triple click e drag and drop​
Computers and Technology
1 answer:
vovangra [49]3 years ago
3 0

Answer:

1.similarity:

  • they are both editing keys

3.ergonomics are designed keying devices that alleviates wrist strain experienced when using ordinary keyboard for long hours

4.

  • .<em>a</em><em> </em><em>click</em> is pressing and releasing the left mouse button once
  • <em>right </em><em>click</em> is pressing the right mouse button once to display a short cut menu with commands from which a user can make a selection
  • <em>double </em><em>click</em> is pressing the left button twice in rapid succession
  • <em>drag </em><em>and </em><em>drop</em> is where by the user drags an icon or item from one location on the screen to another.

You might be interested in
What are the basic Mouse actions called and how are they executed
Nata [24]
The left side is a shortcut for 'Enter' the small wheel in the middle is used to scroll your view of the object,The right is used to intialize options pop-up to edit or initiate commands of the intended target


6 0
3 years ago
Help ......... pleaseeeee
Dmitrij [34]

Answer:

Follows are the solution to this question:

Explanation:

Transport layer:

In the OSI model, this layer lies on the 4th part, which primary function is to directly supply the network connectivity to applications mostly on various hosts.

It provides end-to-end communication over a network and also allows you to send and receive error-free data in the form of data packets that enhanced your privacy.

Flow control and Error control:

The flow control is only used to send or receive information transmission only, while Error control is used designed for error-free communication for both (sender or receiver).

Layer related to the data link layer:

It must be done at different layers on both layers like node-to-node connections, the communicative needs are controlled by flow and error. Flow and error control in the transport layer is done from endpoint to endpoint.

4 0
3 years ago
Rachel should use the feature in a word processing program to find typographical errors. She should apply to have uniform headin
Kay [80]
Yes that is a good starter
5 0
3 years ago
If your DTP document contains watermarks on every page, where can you place them?
GaryK [48]
Under text and make it look like they belong
8 0
3 years ago
Read 2 more answers
If you walked into a room containing three computers and were told one of them was infected with malware, how would you determin
koban [17]

To detect it one can only know if:

  • Your web browser freeze or is unresponsive?
  • System is filled with a lot of pop-up messages?
  • Your computer run slower than normal, etc.

<h3>How can you detect a malware in your computer?</h3>

To Know if You Have Malware in your system, one can dectect it if your system often or suddenly slows down, crashes, or others.

Note that To detect it one can only know if:

  • Your web browser freeze or is unresponsive?
  • System is filled with a lot of pop-up messages?
  • Your computer run slower than normal, etc.

Learn more about Malware from

brainly.com/question/399317

#SPJ1

5 0
2 years ago
Other questions:
  • Read the description of Mike’s work, and identify his profession. Mike’s job is to record sounds in a studio. He studies a video
    14·2 answers
  • เเปลภาษานิราศภูเขาทอง
    10·1 answer
  • A number used to encrypt data is called a(n ________. signature key cookie escrow
    10·1 answer
  • The first thing you must consider in any type of communication is ______.
    9·2 answers
  • ap csp The local, remote, and upstream _______ can each have multiple ___ _____. When a participant in a collaborative group on
    5·1 answer
  • Atoms usually combine with other atoms to form<br> A.elements<br> B.compounds <br> C.nuetrons
    5·1 answer
  • The identification of the technology management framework contain?
    6·1 answer
  • PROGRAM LANGUAGE C
    5·1 answer
  • Assignment 10: Create a Song of the Summer edhesive
    10·2 answers
  • Execute and explain this program using // in Layman's language. Thank you!
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!