1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleksandr [31]
3 years ago
14

Explain the correct ways of using keyboard. .​

Computers and Technology
1 answer:
Naily [24]3 years ago
7 0

Answer:

https://www.digitalunite.com/technology-guides/computer-basics/using-computer/how-use-computer-keyboard

Explanation:

the link at the top should explain it all! :)

You might be interested in
Lost passwords set for documents in Microsoft® Word® documents can be retrieved in the backstage view. True False
Nat2105 [25]

Answer:

True

Explanation:

Hope this helped!

3 0
3 years ago
Read 2 more answers
You just bought a new hard drive for your computer to replace your primary hard drive. After backing your data up and, then, ins
Fofino [41]


It manages the soft and hardware resources of the system. It also provides a stable, consistent way for applications to deal with the hardware without knowing all of the details of the hardware

8 0
3 years ago
Read 2 more answers
True or false questions. If a statement is false, you must explain the reason why it is false: a). Suppose that TCP is being run
Dima020 [189]

Answer:

a. True

b. False

Explanation:

b. False

At the initial stage, the certificate needs to be encrypted not by the public key of certifier.com but by the by the private key of certifier.com.

After which, the certificate which contains lots information, (i.e there's more information in the certificate than just the public key to be certified). The certificate also the CA’s information, the certificate expiration date, etc.

Only this information’s digital fingerprint is encrypted by the certifier.com’s private key.

8 0
3 years ago
Read 2 more answers
One of the most toxic components of a computer is the _____.
defon

I would say A. because that is true but mostly for older computers

4 0
4 years ago
Most operating system is perform these tasks
PIT_PIT [208]

Answer

program that, after being initially loaded into the computer by a boot program, manages all of the other application programs in a computer. The application programs make use of the operating system by making requests for services through a defined application program interface (API). In addition, users can interact directly with the operating system through a user interface such as a command line or a graphical user interface

6 0
3 years ago
Other questions:
  • PLEASE PLEASE PLEASE PLEASE HELP!!! I REALLY NEED HELP AND ILL GIVE U A BRAINLIEST IF UR RIGHT!!
    13·1 answer
  • The company that you work for has recently had a security breech. During the recover and assessment, it was discovered that the
    5·1 answer
  • Differences between Quality of Services and a Service of Quality approach
    9·1 answer
  • Your customer asks you if it would be worth the investment for him to have Ethernet cabling installed to reach each of his works
    6·1 answer
  • What kind of music is liked the most by people
    5·2 answers
  • Once a graph has been created, you would need to start over to make any changes to it. true false
    15·1 answer
  • Difference between tell() and seek().​
    11·1 answer
  • ? Question<br> How are the Internet and the World Wide Web different from each other?
    11·1 answer
  • What is sytem software?
    14·1 answer
  • QUESTION 9
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!