1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
klio [65]
3 years ago
12

What is keyboard? answer me ​

Computers and Technology
2 answers:
Keith_Richards [23]3 years ago
8 0
Something you type on
Grace [21]3 years ago
3 0

Answer:

something you put your fingers on

Explanation:

You might be interested in
What is the best way to protect computer equipment from damage caused by electrical spikes
bixtya [17]

An electrical spike is a temporary, very short (less than a second), increase in the electrical supply voltage.  A common surge protector will stop voltage spikes and surges.  Use surge protectors and UPS devices by connecting all sensitive electronic equipment to UPS or surge protection devices.

8 0
3 years ago
4. When you're working with a word processing document and you press the Del key, what happens?
Thepotemich [5.8K]
When you're working with a word processing document and you press the Del key, C. The entire document is deleted.

I have actually tried doing this to know which choice is the correct answer. I opened a new document, typed some words then pressed the Del key.... NOTHING HAPPENED! The character to the right of the cursor was not deleted, the entire document was not deleted, nor was the formatting style deleted.

I chose letter C because after seeing that nothing happened in an open document, I saved said document and opened the folder where the document was saved. I selected the document and pressed the Del key... a prompt appeared asking me if I was sure that I want to move my file to the Recycle Bin? I clicked yes... the entire document is deleted

7 0
3 years ago
Read 2 more answers
A 2-dimensional 3x3 array of ints, has been created and assigned to tictactoe. Write an expression whose value is true if the el
ludmilkaskok [199]

Answer:

Following are the expression of the given statement.

tictactoe[0][0] == tictactoe[1][0] && tictactoe[1][0] == tictactoe[2][0]

Explanation:

In the following scenario, there is the two dimensional or matrix array of integer data type 'tictactoe' which has a total of nine elements then, after that we have to define the diagonal of the array variable which comprises the very 1st element of the 1st row are equal. So, the following expressions are true according to the scenario.

8 0
3 years ago
Why do clocks tick-toc?
kondor19780726 [428]
The gears and mechanism's sudden movements make the noises
7 0
3 years ago
Read 2 more answers
You have a site (Site1) that has about 20 users. For the last few months, users at Site1 have been complaining about the perform
SIZIF [17.4K]
Upgrade Site1's (probably WAN) network connection.
6 0
3 years ago
Other questions:
  • Which of the following would be a tradeoff of a scientific advancement that enables us to catch fish from the ocean faster than
    5·1 answer
  • What did Fulton design in addition to the steamboat
    5·1 answer
  • ​For complex models, analysts can choose computer-based modeling tools that use _____, which includes standard shapes and symbol
    10·1 answer
  • Ricardo twists his ankle at work but does not immediately realize that he is injured because his ankle is not sore or swollen, a
    5·1 answer
  • The number of pixels that can be displayed on the screen at one time is known as what? screen resolution. viewing angle. color d
    5·1 answer
  • At the beginning of a chapter in a book, the first letter often appears larger than the other text on the page. This
    15·1 answer
  • The local city youth league needs a database system to help track children that sign up to play soccer. Data needs to be kept on
    10·2 answers
  • Qwertyuiopasdfghjklzxcvbnm??
    14·2 answers
  • Is it good to work out at the gym one day with hands then the next with feet, then a pattern?
    11·2 answers
  • What is the most vulnerable information that should be protected to prevent unauthorized access to your online files and records
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!