1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mart [117]
2 years ago
11

to see additional functions available in an open desktop, document or website what action should the user perform?

Computers and Technology
2 answers:
Phoenix [80]2 years ago
6 0

To see additional functions available in an open desktop, document or website, the action that the user should perform is; Right click the mouse

  • When working on either open desktop, document or website, we make use of the mouse button to carry out a couple of operations.

  • Now, the left mouse button is the main button of the mouse primarily used for selection of an item or word or object e.t.c. Whereas, when it comes to seeing more options or functions associated with the highlighted item of the mouse left button or just random additional functions without any selection, right clicking the mouse button would be the best action.

Read more on additional functions at; brainly.com/question/1092681

Westkost [7]2 years ago
5 0

The action that the user must perform to see additional functions is to right-click the mouse

The mouse is used for several actions; some of these actions are:

  • To point
  • To drag
  • To click

In the above list of functions of the mouse, the click event of the mouse is divided into two parts.

  • Right click
  • Left click

The left click function is simply used to select or highlight texts, documents and files.

However, the right click function of the mouse is used to view additional functions which are usually hidden.

Hence, the action that the user must perform to see additional functions is to right-click the mouse

Read more about computer system at:

brainly.com/question/13603602

You might be interested in
Name two different ways you can bring up the my computer folder
sweet [91]

The My Computer folder is a multipurpose tool and is a gateway to all the data stored in the computer. This folder sits at the top of your laptop or PC. It can be found on your computer’s desktop, on the start menu and within the windows explorer. <u>Clicking or double clicking on these options will bring up the My Computer folder. </u>

<u>Another easier way of doing this is to hold down the windows + E combination keyboard keys.</u>

7 0
3 years ago
Read 2 more answers
Jessie will make and sell the trending Baked California Maki. Her Peso mark up is 5.00. Selling price PHP 15.000. How much will
Levart [38]

Answer:

50%

Explanation:

The markup is the difference between the selling price and the cost price. If the mark up is greater than zero, it means there is a profit, if the markup is less than 0, it means there is a loss and if the markup is equal to 0, it means there is breakeven.

Percentage markup = (markup/cost price) * 100%

Selling price - cost price = markup

15 - cost price = 5

cost price = 10

Percentage markup = (markup/cost price) * 100% = (5/10) * 100% = 50%

7 0
3 years ago
In the 1960s, techniques were developed that allowed individuals to fool the phone system into providing free access to long dis
ycow [4]

Answer:

A

Explanation:

4 0
3 years ago
While recording a voice, if the narration is large,it is better to make a :a)a linked object b)an embedded object c)none d)does
goldenfox [79]

Answer:

c)none

Explanation:

Automatic updates can be a great problem in the case of the linked object and an embedded object. Hence, "a" and "b" are not the correct options, and since there is an effect, the d. the option is also not correct, as it does affect. And hence none of these options are correct. And the correct option is c) none.

4 0
2 years ago
In what type of computer are exchangeable disks mostly used?​
sasho [114]

Answer:

Laptops

Explanation:

They are the most common disk exchanging devices.

7 0
2 years ago
Other questions:
  • Unix has experimented with several security programs. a user can attach a watchdog program to a file that grants or denies acces
    13·1 answer
  • "what should you do if the system continually reboots and you can't read the error message produced on a blue screen
    11·2 answers
  • _____ software can help a company manage security, enforce corporate strategies, and control downloads and content streaming fro
    11·1 answer
  • When a packet with the code is transmitted, it is received and processed by every machine on the network. this mode of operation
    12·1 answer
  • .Although SQL is a language, you don’t use it to write applications? (true, false)
    8·1 answer
  • Provide a few examples of how cryptography actually secures data.
    8·1 answer
  • Write a program that reads a person's first and last names separated by a space, assuming the first and last names are both sing
    10·1 answer
  • A teacher wants to create a list of students in her class. Using the existing Student class in this exercise. Create a static Ar
    14·1 answer
  • All of the following are helpful tips for protecting your digital privacy, except:
    10·2 answers
  • What is the role of computer in modern problem solving​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!