1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andre45 [30]
3 years ago
10

(1)similarities between backspace key and delete key. (2) different between backspace key and delete key. (3) explain the term e

rgonomics. (4) explain the following. a click b right click c double click d triple click e drag and drop​
Computers and Technology
1 answer:
vovangra [49]3 years ago
3 0

Answer:

1.similarity:

  • they are both editing keys

3.ergonomics are designed keying devices that alleviates wrist strain experienced when using ordinary keyboard for long hours

4.

  • .<em>a</em><em> </em><em>click</em> is pressing and releasing the left mouse button once
  • <em>right </em><em>click</em> is pressing the right mouse button once to display a short cut menu with commands from which a user can make a selection
  • <em>double </em><em>click</em> is pressing the left button twice in rapid succession
  • <em>drag </em><em>and </em><em>drop</em> is where by the user drags an icon or item from one location on the screen to another.

You might be interested in
Who would be a tippee for purposes of insider trading? a. a janitor who gathers information by reading files on corporate counse
vesna_86 [32]

Answer:

Option A is correct.

Explanation:

A janitor that collects data through reviewing reports on a business counsel's desk could be a tippee for insider trading activities.

Probably, the justification for insider trading remains wrong being that it offers each insider the undue benefit on and around the marketplace, gets the insider's preferences beyond them for which they assume the trustee responsibility, as well as enables the insider to unfairly manipulate the cost of the inventory of a business.

So, the following are the reason the other options are not correct according to the given scenario.

3 0
3 years ago
Declare a character variable letterStart. Write a statement to read a letter from the user into letterStart, followed by stateme
oee [108]
  1. Answer: import java.util.Scanner; public class CharTestt {     public static void main(String[] args) {     System.out.println("Please enter a character ");     Scanner input = new Scanner(System.in);     char letterStart = input.next().charAt(0);     char thenextChar = (char)(letterStart+1);     System.out.print(letterStart);     System.out.println(thenextChar); } } Explanation: Import Scanner Class Prompt user to enter a character Read and save user's input in a variable char letterStart = input.next().charAt(0); Knowing that the next character using ASCII is +1, create a new character variable and add 1 print the character entered and the new character all on same line without spaces
5 0
4 years ago
___ is code that runs when a specific event happens.
Slav-nsk [51]
A callback function is code that's called, or run, when a specific event such as a click of the mouse, happens.Callback is another name for a callback function. Thank you for posting your question here at brainly. I hope the answer will help you. Feel free to ask more questions.
6 0
3 years ago
Who can pick up GPS signals
bazaltina [42]

Devices such as TomTom GPS and Garmin GPS pick up a GPS signal


I hope that's help !

5 0
3 years ago
There are five identical closed boxes. one box contains $10,000, two boxes contain $1000 each, one box contains $1, and the last
sp2606 [1]
Mean means most and the most he can get is the 10000 and the 2 1000s and the 1 dollar so the mean is 12001.
6 0
4 years ago
Other questions:
  • An icon in a document preset that looks like the play button on a YT video, what type of document is the preset meant to be used
    13·2 answers
  • When did the digital revolution begin
    10·1 answer
  • A(n) monitoring vulnerability scanner is one that listens in on the network and determines vulnerable versions of both server an
    7·1 answer
  • In the ADT graph the methid addVertex has efficiency
    15·1 answer
  • The operating system is not responsible for allowing one computer to share information with other computers.
    15·2 answers
  • Which two components in a system might make a loud whining noise when there is a problem? Why?
    14·1 answer
  • What do you think is the most fascinating aspect of the internet?
    7·2 answers
  • Andrew’s Complete Cameras offers its customers an interactive website to help them choose the best camera for their lifestyle. B
    5·1 answer
  • True or Fale A criminal defense attorney's main focus is to convict the accused of a crime, and a state prosecutor is to defend
    12·2 answers
  • Why do you need to put your phone on airplane mode.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!