1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
horsena [70]
3 years ago
7

Which finger types the highlighted keys on a number keypad? A. Third B. First C. Pinky D. Thumb

Computers and Technology
2 answers:
lana [24]3 years ago
4 0

The Answer is B ) First



I took a test :)

Hope it helps!!

Brrunno [24]3 years ago
3 0

Answer:

the answer is A

Explanation:

Because 7 and 4 is the third finger and the 1 and 0 is three fingers away from the third finger.

You might be interested in
Sendstars is a package delivering company that recently made a study on its customer retention and service renewal metrics. They
masya89 [10]

Answer: C. Cause and Effect Modelling.

Explanation:

Data Mining is a technique which aims at obtaining important and useful information in a stockpile of data. This in turn would prove useful in making predictions. It would also inform present decisions.

The Cause and Effect modelling approach explains that for every given action ( effect ), there was a prompting factor ( cause ).

In the case of Sendstars Company, the downward spiral in customer retention was as a result of ill -mannered staff. This effect, prompted the decision to have the employees trained on customer service.

3 0
4 years ago
Read 2 more answers
Which term describes a secure, individual, private cloud-computing model hosted within a public cloud?
grin007 [14]

The term that describes a secure, individual, private cloud-computing model hosted within a public cloud is A hybrid cloud.

<h3>What is this cloud about?</h3>

A hybrid cloud is known to be a system or a model which is said to be a form of a private cloud that is linked with public cloud infrastructure, and it is one that tends to give room for an organization to act workloads in two environments.

Note that In this model, the public cloud is known to be one that is seen and it is one that becomes an extension of the private cloud to make a single, uniform cloud.

Hence, The term that describes a secure, individual, private cloud-computing model hosted within a public cloud is A hybrid cloud.

Learn more about hybrid cloud from

brainly.com/question/27838623

#SPJ1

7 0
1 year ago
Dani is paraphrasing from a paragraph of an article for a post on her blog. Which of the following strategies is least likely to
koban [17]
I would say A. She reads the entire paragraph, then rewrites it in her own words, and then checks to make sure her version is not too similar to the text from the article.


All the other ones are a little too obvious.


Hope this helps you, baii <33

4 0
3 years ago
Read 2 more answers
Hayne is starting his own business as a psychotherapist and needs to post a website advertising his services,contact information
irina1246 [14]

The kind of website which would best suit Hayne's needs is a: C) Dynamic website.

A website is the collective name that is used to describe series of interconnected webpages having a unique domain name.

Basically, a website is an HTML document which comprises codes, tags, images, audios, and videos that are integrated to make them responsive and interactive with clients (end users).

In Computer and Technology, there are four (4) main types of website and these include:

  • Static website.
  • E-commerce website.
  • Scripted website.
  • Dynamic website.

A dynamic website is a type of website which is designed to contain information that automatically changes based on the client, time zone, time of the day, language, services, and other factors.

In this scenario, the kind of website which would best suit Hayne's needs is a dynamic website because his services, tips or contact information may change.

Read more: brainly.com/question/21694571

7 0
3 years ago
Prompt the user to input an integer, a double, a character, and a string, storing each into separate variables. Then, output tho
cupoosta [38]

Answer:

Following are the program in java language:

import java.util.*; // import package

public class Main

{

public static void main(String[] args) // main method

{

 int num; // integer variable declaration

 double r; //double varaible declaration

 char ch; // char variable declaration

Scanner scnr=new Scanner(System.in); // creating the instance of scanner

 System.out.println("Enter the string:");

 String str=scnr.nextLine(); // reda string by user

System.out.println("Enter the integer value:");

 num=scnr.nextInt(); // Read integer value by the user

 System.out.println("Enter the Double value:");

 r=scnr.nextDouble(); // read double value by user

 System.out.println("Enter the character value:");

 ch= scnr.next().charAt(0); // read character by user

 System.out.print(num + " ,"); // display them in a single line

 System.out.print( " " +r +" ,");//dislpay in a single line  

  System.out.print( " " +ch +",");//dislpay in a single line

 System.out.print(" " +str);//dislpay in a single line

}

}

Output:

Enter the string:

ram

Enter the integer value:

34

Enter the Double value:

45.789

Enter the character value:

r

34 , 45.789 , r, ram

Explanation:

Following are the description of program

  • Read the integer ,string,char,double value by the user by using scanner class in "num","str","ch" and "r" variable respectively
  • Print that value in a single line separated by comma by System.out.println statement.

7 0
3 years ago
Other questions:
  • What is MARC? Discuss structure of MARC
    8·1 answer
  • How do you add text to a blank slide layout?
    5·2 answers
  • ____ are the computers that store network software and shared or private user files.
    6·1 answer
  • Which of the following is used to encrypt web application data?
    11·1 answer
  • Write Python code to save the data to a MongoDB collection:Import json module to parse JSON dataImport MongoClient from pymongo
    6·1 answer
  • Why might you use the "search network campaigns with display opt-in" campaign type?
    11·2 answers
  • Using the mouse to move or copy cells is called ____.
    15·1 answer
  • A mobile device user has entered her user ID and password to access an online account. The user immediately receives a text mess
    9·1 answer
  • A technician has been asked to upgrade a processor and needs to do some research. The computer is just a couple of years old. Wh
    13·1 answer
  • A source is:
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!