1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natulia [17]
2 years ago
8

56- What is the term used when you press and hold the left mouse key and more the mouse

Computers and Technology
1 answer:
elena55 [62]2 years ago
8 0

Answer:

i'd say it's dragging, but i'm not 100% sure

Explanation:

You might be interested in
Of the sequences listed below, which shows the correct order of the steps in the incident management workflow: (1) authenticate
slega [8]

Answer:

C.

Explanation:

In the Incident Management Workflow , first you Authenticate the incident; Then log the incident. Then prioritize the problem; and then archive the incident.

Thus, 1 - 3 - 4 - 2

Cheers

3 0
3 years ago
Using the drop-down menu, complete these sentences to describe algorithms. Algorithms are instructions to solve a problem. Algor
vfiekz [6]

Answer:

Algorithms are instructions to solve a problem

Explanation:

6 0
2 years ago
Read 2 more answers
Wow that funny a heck
lorasvet [3.4K]

Answer:

Seriously??? Omg - Orange Trump!!

3 0
2 years ago
Two friends can share 100 songs from their Bluetooth enabled mobile devices
Umnica [9.8K]

Answer:

A

Explanation:

If they are connected via bluetooth, you can share unlimited amounts of anything.

6 0
2 years ago
WordArt styles allow you to add ____.
maria [59]
As for this problem, the most probable and the most likely answer to this would be it depends on the person or the user of it since there aren't any options presented with the problem.

WordArt is there to be of use during presentations, during discussions, and other things. On the other hand, as the technological advancement takes leaps and bounds going forward, this utility seems to be underused and isn't expected to give a more impact to the reader or to the recipient of such document that contains it. This is typically used for people that aren't too familiar yet, as to how to utilize other programs to enhance their documents and files.
3 0
3 years ago
Other questions:
  • On sites that use "cloud computing," how is your information being stored?
    13·1 answer
  • The picture that graphically represents the items you use in windows is called a/an
    5·1 answer
  • Which of the following attacks seeks to introduce erroneous or malicious entries into a server's hostname-to-IP address cache or
    5·1 answer
  • The keyboard usually has six rows of keys. Which of the following is not one of the key group categories?
    7·2 answers
  • If your TV was showing a flat black or blue screen, or had "snow", what steps would you take to fix it?
    13·1 answer
  • Which professionals can benefit from an understanding of statistics? Check all of the boxes that apply. magician trying to locat
    5·2 answers
  • Diverting an attacker from accessing critical systems, collecting information about the attacker's activity and encouraging the
    8·1 answer
  • write a pay-raise program that requests a person's first name, last name, and current annual salary, and then displays the perso
    6·1 answer
  • Question #5
    15·2 answers
  • Identify two real-world examples of problems whose solutions do scale well
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!