1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexira [117]
3 years ago
15

Douglas Engelbart is credited with the invention of _____

Computers and Technology
1 answer:
kicyunya [14]3 years ago
6 0
He created computer mouse
You might be interested in
When inserting a fly in animation what is the first step in the process?
weqwewe [10]

Answer:

you select the element you wish to animate

6 0
3 years ago
What is the most flexible way to modify a report?
Vesna [10]

Answer: Use the Design view

Explanation: Using a Design view to modify a report is the most flexible way to modify a report as opposed to a layout view which is another way to modify a report .  The design view  is flexible in the sense that it provides a more outlined structured view of your report that you can see the header and footer for the report. it also affords you the ability to control your  report in terms of changing many properties, adjusting images, labels  and editing  text box, etc.

8 0
3 years ago
What principle of interaction is John using?
Rainbow [258]

Answer:

but which john

Explanation:

man people don't make sense you more man

8 0
3 years ago
Read 2 more answers
What is control flow in programming?
melisa1 [442]

Answer: Control flow, also known as flow of control in computer programming, refers to the sequence in which function calls, instructions, and statements are performed or assessed while a program is operating. Control flow statements are used in many programming languages to determine which part of code runs in a program at any given time.

4 0
2 years ago
What may happen if a large number of computer users are attempting to access a Web site at the same time that you are?
pav-90 [236]
B. You may be unable to link to the site. This is due to a large amount of traffic that the network cannot process. Eg. A large number of students or people trying to get through a small doorway.
5 0
3 years ago
Other questions:
  • Which program or security application prevents access between a private and trusted network, and other untrusted networks?
    8·2 answers
  • write a simple assembly code using 8088 microprocessor instruction set to add two numbers ? please help me if you know :(​
    11·1 answer
  • Suppose one hundred stores participated in the
    14·1 answer
  • The parts of a memo are _____.
    9·2 answers
  • What is the primary purpose of endnotes?
    6·2 answers
  • In Outlook 2016, the Tell Me function can be accessed by
    15·2 answers
  • What is the definition of a nested function?
    8·1 answer
  • Rebbeca has finished with the research and outline portion of her slide presentation. Now, the next logical step is to begin wor
    11·1 answer
  • The first time that a particular visitor loads a web site page is called a(n) _____.
    8·1 answer
  • Write a while loop that continues to increment uservalue by 5 as long as uservalue is less than 0.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!