1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andre45 [30]
3 years ago
10

(1)similarities between backspace key and delete key. (2) different between backspace key and delete key. (3) explain the term e

rgonomics. (4) explain the following. a click b right click c double click d triple click e drag and drop​
Computers and Technology
1 answer:
vovangra [49]3 years ago
3 0

Answer:

1.similarity:

  • they are both editing keys

3.ergonomics are designed keying devices that alleviates wrist strain experienced when using ordinary keyboard for long hours

4.

  • .<em>a</em><em> </em><em>click</em> is pressing and releasing the left mouse button once
  • <em>right </em><em>click</em> is pressing the right mouse button once to display a short cut menu with commands from which a user can make a selection
  • <em>double </em><em>click</em> is pressing the left button twice in rapid succession
  • <em>drag </em><em>and </em><em>drop</em> is where by the user drags an icon or item from one location on the screen to another.

You might be interested in
When you print ____, the presentation is printed with one or more slides on each piece of paper?
Artist 52 [7]
When you print handouts, the presentation is printed with one or more slides on each piece of paper. When you print handouts, it's best to have the presentation printed on them for those who can not view the presentation clearly to follow along with. This also serves as a great tool for people who missed the presentation to receive a handout later or for those there to take home and review. 
8 0
3 years ago
Technologies that function within the established system are called
vesna_86 [32]
<span>Authorizing technologies are technologies that controls the use of system and network resources through authentication and authorization. 
</span><span>Enabling technologies are innovation technologies that drive radical change in the capabilities of a user or culture.
</span>Obstructing technologies include blocking<span> and filtering, content manipulation, attacks.
</span>Preemption means "prior seizure of" and preemptive technologies <span>take control of the operating system from one task and giving </span>it<span> to another task.
</span><span>Technologies that function within the established system are called enabling technologies.</span>
8 0
3 years ago
How teachers apply stenhouse theory
Scilla [17]

Answer:

In curriculum, a vision of knowledge, the role of the educator and a concept of the process of education are all present. In this sense, Stenhouse suggests that the role of teachers and professors is fundamental in the elaboration and implementation of curriculum.

3 0
3 years ago
What are the optional parameters when configuring DHCP
stealth61 [152]

Answer:

DHCP is the dynamic host configuration protocol that enable the server for assigning the IP address to the computer. It is basically used to provide automatic IP addresses within the network. It is basically used to configure the default gateway and provide the DNS server data in the device.  

The optional parameter when configuring DHCP are:

  • Sub-net mask
  • Router
  • Domain server
  • Broadcast address
  • Host name
5 0
4 years ago
After you select your recipients, the next step in using the Mail Merge Wizard would be to _____.
NARA [144]

Answer:

Write your letter

Explanation:

When using a Mail Merge Wizard in a Microsoft Word Document, this is the process.

  • Click on your document type
  • Click on the starting document
  • Select the recipient(s)
  • Write your letter and add some custom fields
  • Insert your address Block
  • Strike enter and click on Greeting line (to enter a greeting)
  • Preview your letter and click on complete merge
3 0
3 years ago
Read 2 more answers
Other questions:
  • A table with a width set to 600 pixels will look ________ on a monitor with resolution set to 640 × 480 than on a monitor with r
    10·1 answer
  • If your vehicle catches fire while you are driving, you should:
    5·2 answers
  • What does the hard disk drive do? It stores all of the information on a computer. It controls a computer’s operating system. It
    12·2 answers
  • How many arguments are required for the sum function?
    15·1 answer
  • Which are two main areas of the properties inspector
    7·1 answer
  • In the design phase of the systems development life cycle (SDLC), the _____ design is an overview of the system and does not inc
    10·1 answer
  • How do i code........​
    6·2 answers
  • What are input masks most useful for in data validation? moving data from one field to another hiding parts of a value that are
    9·2 answers
  • In a blockchain, each block has a unique hash value which is dependent on the hash value of the previous block in the chain. Wha
    6·1 answer
  • Advantages and disadvantages of algorithm​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!