1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
inessss [21]
3 years ago
13

giving Brianlist (to the correct answers)help plesee question is what is keyboard (long paragraph)​plzz don't spam with unnecess

ary answers !!!!thankyouuuuuuu:)
Computers and Technology
1 answer:
Ira Lisetskai [31]3 years ago
7 0

Answer:

Explanation:

A computer keyboard is an input device that allows a person to enter letters, numbers, and other symbols (these are called characters in a keyboard) into a computer. Using a keyboard to enter lots of data is called typing. A keyboard contains many mechanical switches or push-buttons called "keys".

You might be interested in
Describe how learning can be accessed in your class?​
SpyIntel [72]

There are four main learning styles used in classrooms today: Visual, auditory, reading/writing, and kinesthetic.

8 0
3 years ago
What is the local portion of the e-mail address below? <a href="/cdn-cgi/l/email-protection" class="__cf_email__" data-cfemail="
abruzzese [7]

Every email address is something like this ...  <u>[email protected]</u>

the name after the @ symbol is a domain name that represents the administrative realm for the mail box and the part before the @symbol identifies the name of the mailbox.

<u>twrigley(local portion)</u>@   gumchewer.biz(domain)

twrigley is the local portion  which indicates to the mail server which mailbox the message is from or to.This portion is only important to gumchewer mail server which is why it is called local.


6 0
3 years ago
Print "Censored' if userlnput contains the word "darn, else print userlnput. End with newline. Ex: If userinput is "That darn ca
sasho [114]

Answer:

The code is given below in Java with appropriate comments

Explanation:

//Import the input.

import java.util.Scanner;

class CensoredWords

{

    //Define the main method.

    public static void main(String args[ ])

    {

         //Define the variables.

         String userInput="" ;          

         //Define the scanner object

         Scanner scobj = new Scanner(System.in);

          //Accept the userInput.

         System.out.print("Enter String: ");

         userInput=scobj.nextLine();

         //Check if the input contains darn.

         //Print censored.

         if(userInput.toUpperCase().indexOf("DARN") != -1)

         System.out.printf("Censored");

         //IF the input does not contains darn

         //Print userInput.

         else

System.out.printf(userInput)

         return;

}

}

6 0
3 years ago
How are people that have a lot of points and Brainliests still be only "Ambitious"? Here's an example:
Fiesta28 [93]

Answer:

some times brailny just a wile to update them selves due to all the people on it

Explanation:

5 0
2 years ago
Read 2 more answers
An alien from planet Tao has descended onto Earth.
DochEvi [55]

An alien from planet Tao has descended onto Earth. The Internet is a massive network of networks, a networking infrastructure. It connects millions of computers together globally, forming a network in which any computer can communicate with any other computer as long as they are both connected to the Internet.

Explanation:

  • A packet is the unit of data that is routed between an origin and a destination on the Internet or any other packet-switched network.
  • Network packets are small amounts of data passed over TCP/IP networks.
  • Latency measures the time it takes between your actions and the response between your computer, the internet, and everything in between.
  • An IP address is a label which is used to identify one or more devices on a computer network. It is comparable to a postal address.
  • The Domain Name System (DNS) is vital to the Internet, providing a mechanism for resolving host names into Internet Protocol addresses. Insecure underlying protocols and lack of authentication and integrity checking of the information within the DNS threaten the proper functionality of the DNS.
  • Transmission Control Protocol is a standard that defines how to establish and maintain a network conversation through which application programs can exchange data. TCP works with the Internet Protocol which defines how computers send packets of data to each other.

3 0
3 years ago
Other questions:
  • What is the difference between www vs internet in information technology?
    13·1 answer
  • If all of Earth's history were squeezed into one 12-hour period, how long ago did Precambrian time end? How long did the Cenozoi
    15·1 answer
  • Give the difference betewen recursion and interation in C. Sight what are the advantages and their disadvantages?
    7·1 answer
  • ________ gives its approval to U.S. e-commerce websites that follow strict privacy standards, such as explaining to visitors how
    6·1 answer
  • There are many different types of decision-making. Which of the following is NOT a type of decision-making? a. fiat rule b. sing
    15·2 answers
  • What is the cffa act
    5·2 answers
  • The _____ feature will mark all changes made to a document for others to review at a later time.
    13·1 answer
  • Use the drop-down menus to complete the statements about message marking, categorizing, and flagging.
    13·2 answers
  • Write code that outputs variable numCats. End with a newline.
    6·1 answer
  • 30 POINTS FOR THE CORRECT ANSWERS
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!