1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mart [117]
2 years ago
11

to see additional functions available in an open desktop, document or website what action should the user perform?

Computers and Technology
2 answers:
Phoenix [80]2 years ago
6 0

To see additional functions available in an open desktop, document or website, the action that the user should perform is; Right click the mouse

  • When working on either open desktop, document or website, we make use of the mouse button to carry out a couple of operations.

  • Now, the left mouse button is the main button of the mouse primarily used for selection of an item or word or object e.t.c. Whereas, when it comes to seeing more options or functions associated with the highlighted item of the mouse left button or just random additional functions without any selection, right clicking the mouse button would be the best action.

Read more on additional functions at; brainly.com/question/1092681

Westkost [7]2 years ago
5 0

The action that the user must perform to see additional functions is to right-click the mouse

The mouse is used for several actions; some of these actions are:

  • To point
  • To drag
  • To click

In the above list of functions of the mouse, the click event of the mouse is divided into two parts.

  • Right click
  • Left click

The left click function is simply used to select or highlight texts, documents and files.

However, the right click function of the mouse is used to view additional functions which are usually hidden.

Hence, the action that the user must perform to see additional functions is to right-click the mouse

Read more about computer system at:

brainly.com/question/13603602

You might be interested in
What is security in Technology<br>​
maria [59]

Answer:

IT security is a set of cyber security strategies that prevents unauthorized access to organizational assets such as computers, networks, and data.

3 0
3 years ago
Read 2 more answers
Five programs are currently being run in a computer. Program 1 is using 10 GiB of RAM, program 2 is using 5 GiB of RAM, program
muminat

Virtual memory could be used to allow program 5 to access RAM without any of the data from the other four programs being lost because it is one that tend to allows the system to give all of the process its own memory space that is said to be  isolated from the other processes.

<h3>How is virtual memory used instead of RAM?</h3>

A system is known to make use of a virtual memory and this is one that tend to make use of a section of the hard drive to act like the RAM.

With the use of virtual memory, a system can be able to load bigger or a lot of programs running at the same time, and this is one that tends to hep one to work as if it has more space, without having to buy more RAM.

Therefore, Virtual memory could be used to allow program 5 to access RAM without any of the data from the other four programs being lost because it is one that tend to allows the system to give all of the process its own memory space that is said to be  isolated from the other processes.

Learn more about virtual memory from

brainly.com/question/13088640

#SPJ1

6 0
1 year ago
The numeric keys on a keyboard or calculator are referred to as a:
Anna [14]

Numeric Keypad is the answer

6 0
3 years ago
) A stub network has ______. (Points : 2) one backup route
jeyben [28]

Answer: One backup router

Explanation:

 A stub network is the type of the packet network that basically describe the computer notwork. It typically capable for sending the complex data in the single network path when the network aware about its destination.

A stub network contain the one backup router as the stub routing is the typically designed for conserve the resources of the local router like the central processing unit (CPU) and the memory. It basically improve the stability of the network in the system.

6 0
3 years ago
Outlines help you visualize the slides and the points you will include on each slide.
kvv77 [185]
I don’t know I think true
6 0
3 years ago
Other questions:
  • What is a nonlinear presentation
    9·2 answers
  • What is a benifit of having a client/server network?
    6·1 answer
  • The word computer consists of 64 bits, which is equivalent to _____ bytes.
    5·1 answer
  • The project started the development of inter-network connections using tcp/ip that has evolved into the internet today.
    5·1 answer
  • Trucking A. is one of the least flexible transportation modes. B. is increasingly using computers to manage its operations. C. i
    7·1 answer
  • Sophie Black works as a computer programmer for a software company. Her boss, Mike Jones, is responsible for developing a new so
    8·1 answer
  • Write the definition of a function named printstarbucks that receives a non-negative integer n and prints a line consisting of n
    6·1 answer
  • Use JavaWrite a program that will simulate a change machine found at cash registers. Input the amount due and amount paid from t
    12·1 answer
  • FFFFFFFFFRRRRRRRRRRRRRRRRRREEEEEEEEEEEEEEEEEEEEEEE
    10·2 answers
  • Help!!!
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!