1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitriy789 [7]
3 years ago
14

Identify the type of software that should be in main memory in order to use the keyboard? *

Computers and Technology
1 answer:
Step2247 [10]3 years ago
4 0

Answer:

Ok so im not completely sure about this but i think its

<em>Systems Software</em>

Explanation:

because word processor is for typing documents and stuff

spreadsheet is for like tracking you money your daily money or something

or some kind of graph for stuff like that (i think)

applications software well your keyboard isn't a application unless its the on screen keyboard

so the only one left is <u><em>system software</em></u>

<u><em></em></u>

hope it helped :)))) (●'◡'●)

You might be interested in
Who is the first British in Europe ​
Vera_Pavlovna [14]

Answer:

"The British" are people statically from Great Britain in the UK.

7 0
3 years ago
Write a loop that reads positive integers from console input, printing out those values that are even, separating them with spac
AfilCa [17]

#include <iostream>

#include <vector>

std::vector<int> v;

int main(int argc, char* argv[]) {

   while(1) {

   int temp;

   std::cout << "\nEnter a number: ";std::cin>>temp;

   

   if(temp<0) {

       std::cout << "\nEven number(s) is/are:\n---------------------\n";

       for(int i=0;i<v.size();i++) {

           if(v.at(i)%2==0) std::cout << v[i] << " ";

           else continue;

       }

       std::cout << std::endl;

       break;

   }else {

       v.push_back(temp);

   }

}

   return 0;

}

3 0
2 years ago
1. Discuss the pros and cons of human-computer interaction technology?
Lana71 [14]

!

gcoo!!Exykgvyukhhytocfplanationufvhyg:

3 0
3 years ago
Query: [mcdonalds Austin] Viewport: Fresh User Location: within Houston, TX Result Returned: McDonalds location in a neighboring
son4ous [18]

Answer:

The answer is "Option d"

Explanation:

Description to this query can be defined as follows:

  • All of the three (User location, Location modifier, and viewport) are used to identify range demotions.
  • The Viewport, the new user location in Houston, is a McDonald's address query, where the user looks for the exact location of McDonald's in the area of Austin.  
  • The location modifier and viewport are used to calculate the distance of the demotions Client position.
8 0
4 years ago
The _______ "represents a set of features that enables the user to inform himself whether a security feature is in operation or
quester [9]

Answer:

Visibility and configuration of security.

Explanation:

The visibility and configuration of security represents a set of features that enables the user to inform himself whether a security feature is in operation or not and whether the use and provision of services should depend on the security feature.

4 0
4 years ago
Other questions:
  • Achieving a degree in computer forensics, information technology, or even information systems can provide a strong foundation in
    11·1 answer
  • Which of the following decimal (base-10) values is equivalent to the binary (base-2) value 101001?
    15·1 answer
  • _________ is the process of scanning the network to find out which Internet Protocol (IP) addresses are attached to potentially
    9·1 answer
  • Que es un programa de ordenador?
    10·1 answer
  • __________ is a very simple form of lossless data compression in which runs of data (that is, sequences in which the same data v
    6·1 answer
  • Technology trends in education play a key role in a student’s
    15·1 answer
  • Could someone please explain to me the an electrical circuit.
    13·2 answers
  • What are stored procedures? What kind of attack do stored procedures protect from? Identify two reasons why stored procedures ar
    14·1 answer
  • Which two peripherals are not required to browse the internet?
    8·1 answer
  • Taking control of admin functionality and misusing sensitive data that are unauthorized to access are due to.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!