1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Wewaii [24]
3 years ago
9

Functions of light pen​

Computers and Technology
1 answer:
Svetach [21]3 years ago
3 0

Answer:

A light pen is a computer input device in the form of a light-sensitive wand used in conjunction with a computer's cathode-ray tube (CRT) display. It allows the user to point to displayed objects or draw on the screen in a similar way to a touchscreen but with greater positional accuracy.

Explanation:

You might be interested in
When evaluating mining results, data mining and evaluating becomes
victus00 [196]

Answer:

Q. When evaluating mining results, does data mining and evaluating become an intuitive process?

“Data mining” is technically associated with analysis of very large data sets, to appreciate patterns,and attempt to look at cause to effect relationships. Most of the data is quantitative in nature, and many of the tools relate to that of analysis of numerical /quantitative data.

Explanation:

One of the rules of the game of quantitative analysis, is to allow the “data to do the talking”, Your intuition CANNOT replace the results of quantitative analysis: whether through data mining or humble pencil and paper calculation on the back of an envelope.

With experience you may perhaps see a lot of “counter intuitive results”, Where the final outcome does not make “common sense” - but that is what the data is saying.

It is useful NOT to allow emotions, opinions, to come in the way of any sort of quantitative data analysis.

If you can specify what sort of data you are analyzing a more precise answer can be attempted.

8 0
4 years ago
If you wanted to make certain numbers in a spreadsheet stand out, you should _____.
almond37 [142]
Make the numbers in bold and/or underlined
3 0
3 years ago
Read 2 more answers
With the ease of the Internet, it is not uncommon for individuals to copy skills from resume templates to make themselves look m
Butoxors [25]

Answer:

Content.

Explanation:

With the convenience of the Web, copying skills of resumes models is not unusual among people that create themselves seem quite appealing to such a recruiter. Understanding this, Ed developed a check to examine whether that person's job skills are about what's on the form.  

He is checking the validity of the content because It relates to that of the extent that the products on such a survey seem to be extremely determinative of the whole domain to be measured by the study.

7 0
4 years ago
Which directory holds most of the system log files?
faust18 [17]
I think the answer to that is /var/log hope this helps
5 0
3 years ago
Jasmine plays a game on her computer screen. A moving balloon appears on the screen, and she has to pop the balloon by clicking
Elena-2011 [213]
Please find the answer as attachment.

4 0
2 years ago
Other questions:
  • In a paragraph of no less than 125 words, describe how you would insert a graph in your word-processing document.
    8·2 answers
  • A computer’s BIOS is defined as the
    12·2 answers
  • Write a program that generates a random number between 5 and 15 and asks the user to guess what the number is. If the user’s gue
    5·1 answer
  • The methods of the Character class that begin with ____ return a character that has been converted to the stated format.
    5·1 answer
  • How might the website owner use theses details other than to verify login details?
    6·2 answers
  • What two devices in a computer should be considered "black boxes," and should never be opened due to risks involving charged cap
    13·1 answer
  • What happens when a dataset includes records with missing data?
    9·1 answer
  • Interest on loan paid to sangam stores Rs5000(journal entry)​
    13·1 answer
  • What is the answer ????​
    9·1 answer
  • which filename refers to a 16-bit real-mode program that queries the system for device and configuration data, and then passes i
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!