1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
klio [65]
3 years ago
12

What is keyboard? answer me ​

Computers and Technology
2 answers:
Keith_Richards [23]3 years ago
8 0
Something you type on
Grace [21]3 years ago
3 0

Answer:

something you put your fingers on

Explanation:

You might be interested in
find all breweries that specialize in a particular beer style. A brewer is considered specialized if they produce at least 10 be
kolbaska11 [484]

Answer:

select style_name,br.name as brewery,count(beer_id) as Num

from beerdb.beers be  

inner join beerdb.styles st

on be.style_id = st.style_id

join beerdb.breweries br on  

be.brewery_id = br.brewery_id

group by style_name , br.name  

having count(beer_id)>=10

order by style_name, num desc

Explanation:

7 0
3 years ago
Que se trata el RUC<br>​
mariarad [96]
No se senor i no sure
7 0
3 years ago
HELLO answer this. Sidney needs to create a decimal number variable that will be added to another number. What kind of variable
kipiarov [429]

Answer:

Option D. float is the correct answer.

Explanation:

Decimal number contains decimal point. Out of all the given data types, float data type store the number with decimal point.

As the number has to be further used for calculations float ahs to be used. Because the numbers can also be stored in string but cannot be used for further calculations.

Hence,

Option D. float is the correct answer.

8 0
3 years ago
Read 2 more answers
In the LC-3, how many memory words are used to store the string "rainbow"?
oksian1 [2.3K]
The number of memory words used to store the string "rainbow" is 8.
5 0
3 years ago
A malicious user in your organization was able to use the Trinity Rescue Kit to change the password on a department manager's co
netineya [11]

Answer:

The answer is "The PC should be kept in a physically secure location".

Explanation:

In general, malicious users are hackers as well as malicious users. This user indicates that even a rogue worker, contractor, student, and another consumer who uses his sensitive rights is indeed a common word of violation of information in security circles and the headlines, and to manage the data from the theft the system should be on the physically secure location, that refers to any place, a room or a group of room within facilities of physical or staff security protocols that are sufficient to support the AI-based on LEIN and related Is a physically safe room.

7 0
3 years ago
Other questions:
  • 3. Which of the following phase types will make a sound louder? In-phase, inverted phase, or partial phase angle waves?
    7·2 answers
  • What 2 major agricultural inventions did jethro tull create?
    10·2 answers
  • Quinton is having trouble learning Spanish because he keeps reverting back to the grammatical structures of his native English l
    6·1 answer
  • Which shortcut key combination will move the cursor to the beginning of the line?
    13·1 answer
  • The term that refers to the standard computer language for creating web pages is called:
    6·1 answer
  • You need to subnet a network that has 5 subnets, each with at least 16 hosts. Which classful subnet mask would you use?A. 255.25
    12·1 answer
  • Which category does this fall in identity theft​
    6·1 answer
  • Cual
    5·1 answer
  • The people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can simulat
    13·1 answer
  • Which of the following best explains how algorithms that run on a computer can be used to solve problems?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!