1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zlopas [31]
3 years ago
6

Describe how you will lunch a web browser using the start menu​

Computers and Technology
2 answers:
Kay [80]3 years ago
8 0

Answer:

The steps are described as follows:

  • <em>Click on the start menu button on your keyboard</em>
  • <em>Place the mouse pointer in the search area</em>
  • <em>Type in the name of the browser (eg. Microsoft Edge or Internet Explorer etc.)</em>
  • <em>Press enter on the keyboard or you click open/start</em>
  • <em>Wait, while the browser opens</em>

Explanation:

The steps are self-explanatory

EleoNora [17]3 years ago
7 0

Answer:

Kindly check explanation

Explanation:

To launch a web browser using the start menu:

Click on the windows icon or start menu to open a search option, then type the name of your preferred browser, maybe Chrome, Firefox, safari, explorer or any other. Once the appropriate searched item pops up, place the cursor on the appropriate or preferred browser icon. Once the cursor is on the browser icon, you can either left click on the muse to display the available options, the right click on launch or start on the menu displayed. OR you can double click the the right side of the mouse to launch directly.

You might be interested in
The ____ class act as a switchboard between the view layer and the domain layer.
nadya68 [22]

The <u>control class</u> acts as a switchboard between the view layer and the domain layer.

Explanation:

As the name suggests, the control class is responsible for performing the control actions. The view layer defines the entities and attributes which have to be viewed and their structural organization.

The domain layer consists of all the entities, attributes, and relations in the data. The control class controls the flow of information between the two layers and performs the operations of filtering and selecting the content to be displayed.  

3 0
3 years ago
write a C program the prints out the size of variables with the following C data types- int, long, unsigned, long long, double,
Anit [1.1K]

<u>C program for finding size of different data types</u>

#include <stdio.h>

//driver function

int main()

{

   int a;  //declaring a of type int

   float b; //declaring b of type float

   double c; //declaring c of type double

   char d; //declaring d of type char

   long e; //declaring e of type long

   long long f; //declaring f of type longlong

   unsigned g; //declaring g of type unsigned

   // Sizeof operator is used to evaluate the size of a variable

printf(" int data type contains: %lu bytes\n",sizeof(a));/*Finding size of int */

printf("float data type contains : %lu bytes\n",sizeof(b));/*Finding size of float */

printf("double data type contains: %lu bytes\n",sizeof(c));/*Finding size of double */

printf("char data type contains: %lu byte\n",sizeof(d));/*Finding size of char */

printf("long data type contains: %lu byte\n",sizeof(e));/*Finding size of long*/ printf("longlong data type contains: %lu byte\n",sizeof(f));/*Finding size of longlong */

printf("unsigned data type contains: %lu byte\n",sizeof(g)); /*Finding size of unsigned */

   return 0;

}

<u>Output</u>

int data type contains: 4 bytes

float data type contains : 4 bytes

double data type contains: 8 bytes

char data type contains: 1 byte

long data type contains: 8 byte

longlong data type contains: 8 byte

unsigned data type contains: 4 byte

4 0
3 years ago
An early attempt to force users to use less predictable passwords involved computer-supplied passwords. The passwords were eight
Sedaia [141]

Answer:

Recently, with the new and advanced hacking algorithms and affordable high-performance computers available to adversaries, the 36 character computer suggested passwords can easily be insecure.

Explanation:

The 8 length passwords generated pseudo-randomly by computers are not secure as there are new algorithms like the brute force algorithm that can dynamically obtain the passwords by looping through the password length and comparing all 36 characters to get the right one.

And also, the use of high-performance computers makes these algorithms effective

7 0
3 years ago
2. Why do old video games have large pixels and images with jagged edges?
egoroff_w [7]

Answer:

A

Explanation:

cuz yea

3 0
2 years ago
"A software package developed to handle information requirements for a specific type of business is called a horizontal applicat
goldfiish [28.3K]

Answer:

<h3>False </h3>

Explanation:

Vertical application software it the software which if build as per the specific requirements for achieving specific processes and functions which are unique to a user or business. These softwares are customised as per the needs of an organisation or enterprise. these applications are useful for organisations operating in marketing, sales, inventory etc but cannot be used by other businesses. They are built to target specific users. ERP(Enterprise Resource Planning ) and CRM (Customer Relationship Management ) are examples of vertical applications.

3 0
3 years ago
Read 2 more answers
Other questions:
  • 13. The Save As command is useful if you want to copy an open document and
    7·2 answers
  • How is IT related to new business initiatives?
    6·1 answer
  • My home PC has IP address 192.168.1.22 and connects to the Internet through a NAT router. Assume I am downloading a web page fro
    5·1 answer
  • What menu allows you to look up a command and learn how to use it?
    14·1 answer
  • THIS IS PYTHON QUESTION
    11·1 answer
  • Consider the following schema for customer: (id, name, street, city, state, zip, phone), in which customers are uniquely determi
    10·1 answer
  • There are many apps that help find you cheaper gas. If the cost of a gallon of regular gas is $3 at one station and $3.50 at ano
    15·1 answer
  • When must an Assured Equipment Grounding Conductor Program (AEGCP) be in place?
    13·1 answer
  • List one unprofessional AND one professional example of internet/social media
    15·1 answer
  • Why is technology bad for you
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!