1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ladessa [460]
3 years ago
13

How are keyboards applied in the real world

Computers and Technology
1 answer:
Andru [333]3 years ago
6 0
Keyboards are used to type on electronics in the real world.
You might be interested in
When saving a document or drawing, you determine the destination folder in which the file will be saved by?
bekas [8.4K]

making a selection in the Save in: box.<span>

</span>
8 0
3 years ago
I’m order to protect your passwords, don’t use easy-to-guess information, don’t share your passwords, and NEVER change your pass
Elena L [17]

Answer:

true!

Explanation:

its better to know your password :))

3 0
3 years ago
What is the database and presentation for files​
Nutka1998 [239]

Answer:

Database Management System ppt DBMS

I don't know if that is right. Sorry if it's not.

6 0
3 years ago
Read 2 more answers
What are the WORST computer malware in your opinion it can be worms backdoors and trojans I just want a input, nothing right or
tankabanditka [31]

Answer:

I think probably mydoom

Explanation:

as it estimated 38 billion dollars in damage, also this malware is technically a worm

5 0
2 years ago
Which component of the computer keeps the operating system when the computer is running​
Brums [2.3K]

The CPU performs the instructions and writes the data back into your computer's random access memory or RAM. RAM temporarily stores data while your computer is running.

4 0
3 years ago
Other questions:
  • It is a function that ends the connection to the database.
    9·2 answers
  • What part of the computer gives access to the internet
    10·1 answer
  • Which resource helps a user access a cloud service?
    8·1 answer
  • (15 POINTS) When an error is made in HTML code, the browser does what?
    11·1 answer
  • A _______________ is a security threat that may launch a worm through a Trojan horse or launch a denial-of-service attack at a t
    10·1 answer
  • Write the code for invoking a method named sendObject. There is one argument for this method which is of type Customer. Assume t
    14·1 answer
  • Read the scenario below, and then answer the question.
    13·1 answer
  • What are the network topologies? Advantages and disadvantages.
    9·1 answer
  • What is the meaning of antimonographycationalis​
    9·2 answers
  • A specialized output device for producing charts, maps, and very high-quality drawings is
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!