The answer is B Okay good luck and dont...mess it up
Well, Touch screen is only an input device as it only takes the input resistance(or capacitance in new touch screens) value as per the touch on the screen. And this value of resistance would determine the location of the touch on the screen.
The output work is done by the LCD or LED displays, which displays some images and texts on screen.
Touch Screen is only a transparent glass which is place on that display and synchronized with the LED displays such that user is able to 'touch' or have a 'sense of touch' on the actual displays
Answer:
through electronics we have a electrified lighted world. our homes,are lit with light using electricity. the stereo we listen to, electricity makes it happen. tv,computers, and record turntables all need electricity. electricity makes things possible that would otherwise be either impossible or very arduous. we see sounds and enjoy them. we watch entertaining movies. we read books and do our homework with the appreciated help of electricity.
Answer:
<u>False</u>
Explanation:
Note, the Rapid Application Development (RAD) software development approaches are noteworthy not for its expanded design details but for <u>its simplicity of the software development process.</u>
In other words, the RAD approaches while taking user preferences into the software development process, focuses on making the software design process more flexible, such as by employing the use of prototypes, and less unnecessary details.
Answer: Cyber warfare is a real threat since being able to hack another computer especially a countries computer with lots of info in their weaknesses can lead to their downfall. Since they can even possibly if their skilled enough hack their entire data base system and leak it to the public and that wouldn't be good for them not in a single possible way. That's the reason it's dangerous not only that but also because they can access their servers; which can let them access anything online from the whole country including banking information military info which can let them know which area there gonna go to next equipment there gonna bring and where they're gonna launch missiles, bombs, even nukes if they decide to launch one. And being able to hijack the computer that launches the nukes can make the hacker launch the nuke to a different place or launch the nuke on the country trying to launch the nuke.
Explanation: