1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zlopas [31]
3 years ago
6

Describe how you will lunch a web browser using the start menu​

Computers and Technology
2 answers:
Kay [80]3 years ago
8 0

Answer:

The steps are described as follows:

  • <em>Click on the start menu button on your keyboard</em>
  • <em>Place the mouse pointer in the search area</em>
  • <em>Type in the name of the browser (eg. Microsoft Edge or Internet Explorer etc.)</em>
  • <em>Press enter on the keyboard or you click open/start</em>
  • <em>Wait, while the browser opens</em>

Explanation:

The steps are self-explanatory

EleoNora [17]3 years ago
7 0

Answer:

Kindly check explanation

Explanation:

To launch a web browser using the start menu:

Click on the windows icon or start menu to open a search option, then type the name of your preferred browser, maybe Chrome, Firefox, safari, explorer or any other. Once the appropriate searched item pops up, place the cursor on the appropriate or preferred browser icon. Once the cursor is on the browser icon, you can either left click on the muse to display the available options, the right click on launch or start on the menu displayed. OR you can double click the the right side of the mouse to launch directly.

You might be interested in
Which type of computer allows the user to enter text by handwriting
mixer [17]

Answer:Pen computing refers to any computer user-interface using a pen or stylus and tablet, over input devices such as a keyboard or a mouse.

4 0
4 years ago
Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT
raketka [301]

Answer:

C. DAT-1

Explanation:

Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.

Common hashing algorithms applied, include;  the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.

4 0
3 years ago
Hey can someone help?
Zinaida [17]
Send an email to it!
4 0
3 years ago
Read 2 more answers
Ternary operators of computer<br><br>please explain. ​
Nitella [24]

Answer:

It's a compact way of doing an if-else statement.

General Format is

<<em>condition</em>> ? <if condition is true> : <else>;

Example:

I could rewrite:

  if(a==1) temp = 1;

  else     temp = 999;

as

  temp = (a==1) ? 1 : 999;

5 0
3 years ago
. A wireless ……..is a device used to resolvewireless network connectivity problems.
Setler [38]

Answer:LAN adapter

Explanation:

LAN adapter is use to connect a computer to the network in an local area network. The connection is possible via a modem or a router which helps to reduce the wireless connectivity problem.

4 0
3 years ago
Other questions:
  • Super Easy !!! Which of the following is one of the most primary maintenance steps for software?
    12·2 answers
  • A user reports that he can't connect to a specific website. you go to the user's computer and reproduce the problem. what should
    11·1 answer
  • Which of the following cannot be copyrighted? a. books b. inventions c. videos d. music
    7·1 answer
  • A computer ________ is two or more computers connected using software and hardware so that they can communicate with each other.
    10·1 answer
  • HELP I WILL MARK BRAINLIEST!!! I NEED ASAP!!!
    5·1 answer
  • Which utility is used to transform a standalone Windows Server 2012 R2 system into an Active Directory domain controller?
    6·1 answer
  • What are some of the ways we can resolve IPv4 address shortages? Check all that apply.
    13·1 answer
  • 4. True or False: In order to use wi-fi signal/network, you have to remain seated in one spot.
    6·1 answer
  • Which keyboard shortcut would you press to copy cells that are selected in a spreadsheet?
    14·1 answer
  • when connecting to a wireless local area network (wlan), what is the most important fact about the service set identifier (ssid)
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!