1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
torisob [31]
3 years ago
9

Describe how keyboard software works and which problems does keyboard software need to handle?

Computers and Technology
1 answer:
Anastaziya [24]3 years ago
3 0

Answer:

The target computer's operating system and gain unauthorized access to the hardware, hook into the keyboard with functions provided by the OS, or use remote access software to transmit recorded data out of the target computer to a remote location.

No physical sensation of pressing a button results in misfires. Lack of physical divisions between keys makes touch typing impossible. Smaller key spacing results in typos.

You might be interested in
Are one of the greatest features of Photoshop that allow nondestructive editing of images.
ioda

Answer:

The answer is explained below

Explanation:

They are many features in photoshop that allow for nondestructive editing of images, these are:

  1. Dialog box: It also for the user to undo an activity to the last change
  2. Layer: It contain data that can be adjusted to change the appearance of an image.
  3. Mask: It protect a designated portion from changes you want to make.
  4. Smart Objects: It allows for the editing of an image without altering or damaging the original image
  5. Revert: It allows you to go back to the original image as it was when you opened the document.
  6. Crop: After cropping an image you can choose to hide the cropped part instead of deleting it.
7 0
3 years ago
How can I code this in Python with only if-statements? (Only allowed to use the built-in functions int(), float(), and str().)
yan [13]

str)float)sorry dont know

5 0
3 years ago
3 Points
tino4ka555 [31]

Answer:

its B the person in the comments were right

Explanation:

took an edge test

6 0
3 years ago
Incident damage ____ is the rapid determination of the scope of the breach of the confidentiality, integrity, and availability o
Dominik [7]

Answer:

The answer is "assessment"

Explanation:

In the given question some information is missing, that is options that can be described as follows:

a) containment strategy.

b) assessment.

c) incident response.

d) disaster assessment.

Assessment also known as community risk, which is used for evaluations. It played a crucial role in the reaction and recovery after a dangerous incident in any organization.

  • In this process, the Information of the degree and the position, which is lost are included in the collected information by the Accident investigation Taskforce.
  • This data is analyzed to evaluate the needs of members and the entire community, and other choices are wrong that can be described as follows:
  • In option a, It is a part of world war II, that's why it is wrong.
  • In option c, It is a method that is sort major incident, that's why it is wrong.
  • In option d, It uses cost control and risk avoidance, that's why it is wrong.

8 0
3 years ago
We can include following item(s) during configuration itemidentification:
Ainat [17]

Answer:

d) All of the above

Explanation:

In configuration management, the Identify configuration items, work products and related components are present.

  • All the documents which are related to the work,the manuals how that the system works are present in the configuration item identification.
  • The source code that is implement for the functioning of the products.These are implemented at the time of generation of products.
  • Software Requirement Specifications are also specified by SRS it is present in design stage of software development life cycle,it is also a part of configuration item identification.
5 0
3 years ago
Other questions:
  • All of the following are stages in the SDLC except _____.
    9·1 answer
  • To access WordPad, Jill will click on Start, All Programs, Accessories, and WordPad. To access Notepad, Karl will click on Start
    11·1 answer
  • Heather has segmented all of the individuals in her database into four categories according to how many game tickets they purcha
    12·2 answers
  • True / False<br> An instruction’s opcode generally indicates the number and type of its operands.
    5·1 answer
  • When a chart is selected, numerous customization options can be found on which Chart Tools tabs?
    11·2 answers
  • ¿Quién recibe la orden de ejecución de un programa enviada por el usuario?
    9·1 answer
  • Need answer ASAP.
    8·1 answer
  • When adjusting the aperture, an F-stop of F32 lets in more light then a setting of F8
    10·1 answer
  • Why does a crane need to rotate/swivel​
    9·1 answer
  • Which describes the Paradox of Automation?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!