1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Westkost [7]
3 years ago
6

How should you clean the keyboard on your desktop computer? Check all of the boxes that apply.

Computers and Technology
2 answers:
Papessa [141]3 years ago
5 0

Answer:

<u>A. Hold your keyboard upside down over a wastebasket. </u>

<u>B. Gently shake the keyboard. </u>

<u>C. Hold the keyboard vertically over a wastebasket and spray with compressed air.</u>

Explanation: This is the correct answer on <u>Edge 2021</u>, just did the assignment. Hope this helps ^-^

natta225 [31]3 years ago
3 0
I think it’s the second and the third one. Sorry if I’m wrong but that is what I would put.
You might be interested in
A company organizes all of its client database in order of the amount of money that the account is worth. When a new account is
svet-max [94.6K]

Answer:

The addition and count algorithm

Explanation:

3 0
2 years ago
When you're working with a word processing document and you press the del key, what happens?
LuckyWell [14K]
The correct answer is C.
6 0
3 years ago
Keeping in mind the role the order of precedence plays in equations, what would Excel display as the result of the following equ
Arlecino [84]
Keeping in mind the role the order of precedence plays in equations, what would Excel display as the result of the following equation?

=(24+75)/(6*3)
=99/18
= 5.5
18)99.0.
90.0
9.0

D. 5.5



6 0
3 years ago
In order for an IT security framework to meet information assurance needs, the framework needs to include policies for several a
Ugo [173]

Answer:

(1) Protecting the privacy of personal data and proprietary information

(2) Proprietary Information

These two cannot be infringed on but below are the policies that must be taken in high esteem and can be infringed upon

(1) Disaster Recovery Policy

(2) Acceptable Use Policy

(3) Business Continuity plan

4 0
3 years ago
Shadow and highlight create depth (3D).<br> TRUE OR FALSE
tamaranim1 [39]

Answer:

true because then it would be like not popping out

7 0
3 years ago
Other questions:
  • Which of the following correctly describes the function of an IP address?
    7·1 answer
  • A teacher uses the spreadsheet below to determine the average quiz score of each student. The teacher inserts this information i
    11·2 answers
  • __________ ensure that hardware and software produced by different vendors work together.
    14·1 answer
  • In your own words, describe what Internet Protocols are. Why is it important to have agreed upon protocols?
    6·1 answer
  • The company where Derek works has tasked him with setting up and securing a SOHO router. He wants to make sure the wireless netw
    11·1 answer
  • Rewrite this if/else if code segment into a switch statement int num = 0; int a = 10, b = 20, c = 20, d = 30, x = 40; if (num &g
    13·1 answer
  • Which of the following is NOT a useful strategy when making an informed purchase ?
    7·1 answer
  • Exercise 3.6.9: 24 vs. "24"5 points
    7·1 answer
  • There are parallels between the trust models in Kerberos and Public Key Infrastructure (PKI). When we compare them side by side,
    15·1 answer
  • Re:
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!