1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleksandr [31]
3 years ago
14

Explain the correct ways of using keyboard. .​

Computers and Technology
1 answer:
Naily [24]3 years ago
7 0

Answer:

https://www.digitalunite.com/technology-guides/computer-basics/using-computer/how-use-computer-keyboard

Explanation:

the link at the top should explain it all! :)

You might be interested in
A/An _______ occupies a continuous block of multiple pieces of data.
Ulleksa [173]
The answer to your question is A group
5 0
3 years ago
Read 2 more answers
What can Marla enter into cell A11 to find out how much money is left in her budget and to make sure the cell is updated wheneve
Nookie1986 [14]
Personally I have my budget spreadsheet with all of my expenses in columns. Then I have a column showing my estimated paycheck (updating with actual# later).  Then the formula in the "Remaining" column that I use is this:    sum((A1:A99)-A100)  Where A1 through A99 (or whatever# of expenses you have) and -A100 or whatever cell name your paycheck/money is entered into - and that's all I do.  I actually have a 3 year budget, including birthdays, holidays, vacations, etc. so that you can plan ahead for any expenses and save away any extra.
8 0
3 years ago
What is the least number of bits you would need to borrow from the network portion of a Class B subnet mask to get at least 130
Tatiana [17]

Answer: Eight

Explanation:

A class B address is 255.255.0.0. We need to borrow 8 bits from the network portion to have atleast 130 host per subnet.

11111111.00000000.00000000.00000000

8 0
3 years ago
Terrence smiles at his customers, helps his cowokers,and stays late when needed. What personal skill does Terrence demonstrate
adell [148]

Answer: Humility,kindness

Explanation:

5 0
3 years ago
Read 2 more answers
A computer scientist creates a necklace to celebrate the birth of her daughter. The necklace encodes her daughter's
Vesna [10]

Answer:

26

Explanation:

I just know it ok; rjkhshwnwjk

5 0
4 years ago
Other questions:
  • Which of the following self-contained APs are autonomous, or independent, because they are separate from other network devices a
    5·1 answer
  • The technological advancements allowing for
    10·1 answer
  • Technician A says a 2:1 gear ratio doubles the amount of torque. Technician B says a 2:1 gear ratio reduces the speed by half. W
    8·1 answer
  • What is this system's reliability at 700 hours? Component failure data is: Failure Rate of A = 0.0007 failures/hour Reliability
    9·1 answer
  • Write a statement that declares an int variable named count.
    9·1 answer
  • Which organization has published more than 300 web standards
    7·1 answer
  • An employee’s total weekly pay equals the hourly wage multiplied by the total number of regular hours plus any overtime pay. Ove
    13·1 answer
  • When responding to an incident in which explosive materials are suspected, is it safe to use wireless communication devices?
    12·1 answer
  • A non technical kind of cyber intrusion that relies heavily on human interaction and often involve tricking people into breaking
    5·1 answer
  • NEED HELP ASAP!!!
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!