A mouse that emits and sense light to detect its movement is called an _______________ mouse.​

Answers

Answer 1
The answer is: “optical” mouse

Explanation:

optical mouse:

uses devices that emit and sense light to detect the mouse's movement

Related Questions

Which device do you think is the most important in the development of human civilization

Answers

Answer: The most important characteristic for the development of a civilization is the presence of advanced cities because they were centers of trade, which established economies and allowed for further development of the civilizations.

Explanation:

Your welcome :)

What types of games became popular in the 90s? List three games and how they had evolved from their successful 80s video game rivals.

Answers

Answer:

Doom (1993) Half Life (1998) Super Mario 64 (1997)

Explanation:

Doom and Half-Life were PC games.

Doom was an early 90s PC shooter that was "3d" it wasn't actually 3d but it used a unique rendering system to make it look 3d. It was a level to level shooter that also included secrets

Half-Life was a Actual 3D game and required quite a beefy Graphics card in your computer at the time to run it smoothly, It was a long story-driven game

Super Mario 64 was one of the first "True 3D" games on Home console because it was a launch title for the brand new N64 It utilized the hardware for a brand new experience for console players.

Most 80s games were even more primitive and were either Hosted in arcade cabinets at your local Arcade Such as Outrun (1986) (Btw great soundtrack!) or the NES that allowed you to play the Original few Mario games that were all 2D.

So one of the biggest Evolutions in 80s to 90s gaming is the introduction of 3D titles being able to run on good computers in the early 90s and home consoles could also run 3D titles at the end of the 90s

Pls, mark Brainliest I put my heart and soul into this. Very fun Question!!!

what is the difference between internal and external css?

Answers

Answer:

Internal CSS are the ones that we can write within the same file i.e the HTML code and CSS code are placed in the same file.

External CSS is that we can write in a separate file than the HTML code i.e the HTML file is separate like(index.html) the CSS file is separate like(style.css).

Explanation:

True or False: Visual Studio is not a part of Unity. You could use a different code editor to edit your C# scripts if you wanted to.

Answers

Answer:

True

Explanation:

Visual Studio and Unity are two different things. Visual Studio is an IDE developed by Microsoft, and Unity is a game engine developed by another company. Visual Studio is the default editor in Unity, but you are able to use something different.

Source: https://docs.unity3d.com/Manual/ScriptingToolsIDEs.html

There are different kinds of true statement.  Visual Studio is not a part of Unity is a true statement.

Is Visual Studio a part of Unity?Visual Studio is known to for  Mac Tools and also for Unity is said to be part of  the installation of Visual Studio for Mac.

You can verify the type of Visual Studio differs for Mac and other product.

Learn more about Visual Studio from

https://brainly.com/question/4925305

Just take points, this website is so weird because of all the reporting and I didn't do any thing

Answers

Answer:

I agree with you! And thank you for the points

Explanation:

I answer educational questions and ask one of my own regarding math and it gets reported

Someone asked if their art was good and how they can improve it and it gets reported

But the only questions they don’t report are free po!nts

For the people who don’t have anything better to do then report people trying to get help: STOP ITS ANNOYING NOT JUST FOR ME BUT THE PEOPLE WHO ARE TRYING TO GET HELP, INSTEAD OF REPORTING WHY DONT U HELP PEOPLE???

Answer:but this is free ponts so it is safe uggg

what is the name of the method of problem solving that breaks a problem imto smaller problems​

Answers

Answer:

The first thing that came to mind was when my parents tell me "Take it one step at a time" I hope this helps

Explanation:

one Q what will be the answer?

Answers

Answer: a computer system that has one function within a large system

Explanation:

the key word here is EMBEDDED which means WITHIN SOMETHING ELSE

why does messenger keep saying waiting for network

Answers

you prob need to fix your data or redownload it again

After hacking into atm systems remotely using a laptop, What attacker worked with the atm manufacturers to resolve the identified security vulnerabilities

Answers

grey hat hackers are those after hacking into ATM systems remotely using a laptop, works with the ATM manufacturers to resolve the identified security vulnerabilities

A grey hat hacker is simply known as an hacker that falls between the range of black and white hacker. They are known to illegally break into systems so as to show off their skills to the administrator of the system they penetrated or to seek to sell their services in repairing security breaches.

In the ATM case, they attacked it and then also want the ATM manufacturer to use their service.

Conclusively we can therefore say that the hacker was a gray hat hacker.

Learn more from

https://brainly.com/question/15899195

Sigma Technology is a company based in Singapore, with branches in 24 countries. It needs multiple CAs in different locations to verify and sign digital certificates for the company. They are looking for an option where, even in the absence of a CA, other CAs can issue the certificates. Additionally, they are also looking for CAs who will overlook other CAs in different locations. In such a scenario, which PKI trust model should they use

Answers

PKI trust model that should be used, is a distributed trust model.

A distributed trust is a trust model that gives power to different source while taking the power away from a single source and thereafter, shares that responsibility to the wide range of sources. It is important as it allows trust to flows through network, marketplaces and forums.

With the use of this distributed trust model, Sigma Technology can have multiple CAs in different locations to work on behalf of the company. And even if one is absence, other CAs can still issue certificate without any hindrances.

Conclusively, we can say that PKI trust model that should be used is a distributed trust model.

Learn more from:

https://brainly.com/question/14837773

What appealed to people and especially kids of the 70s and 80s about gaming?
What parts of early gameplay, and which aspects of the games are still relevant today?
What are the major aspects in which gaming has improved since then?

Answers

question 1- it appealed as the ultimate playthings and competed to master them and set the high score, or the record for longest time playing.

question 2- Gameplay is arguably the most important aspect of a game. You can have breathtaking graphics and an enthralling storyline, but if the main game mechanics the player will be performing aren't fun, your project may as well have been a movie.

question 3- Gaming is really a workout for your mind disguised as fun. Studies have shown that playing video games regularly may increase gray matter in the brain and boost brain connectivity. (Gray matter is associated with muscle control, memories, perception, and spatial navigation.)

hope this helps :)

Which of the following behaviors does not harm a company if your employment is terminated?

getting a copy of word-processing software before leaving

selling trade secrets to competing companies or to your future employer

creating a username and password so you can access company information after you have left

notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave

Answers

Answer:

Notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave.

Explanation:

Trying to grab a copy of your work software can harm the company by potentially creating a security risk. There can still be residual files left by the company left in the software, and any virus or hackers that access your computer can find those files or connect to the company's cloud network.

Selling trade secrets will not only be bad for the company once your employment is terminated, but can actually lead to job termination itself because with those secrets out, competing companies can make identical products of the same (or better) quality for less money, which could result in a loss of profits or even going out of business. This is why non-disclosure agreements exist.

If you can still access company information even after you leave, this poses a security threat to the company because you can then sell that information to other companies or leak it online for everyone to see. Even if you don't do it yourself, a virus or hacker lurking on your computer would be more than happy to do it for you. That information could also be personal payment or identifying information of employees and clients/customers, which could cause people to lose trust in the company.

The best thing to do to avoid facing these consequences and protect other people's information is to turn over your accounts and any information you have of the company and allow them to revoke your access to that information. This not only helps the company remain secure and profitable, but you also won't have to possibly deal with law enforcement and have fewer job opportunities as a result.

Answer:

D. Notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave.

Explanation:

the most important keyboard instrument of the romantic period was the

Answers

Answer:

piano

Explanation:

________ is the use of information technology to support the sharing of content among networks of users.

Answers

Answer:

The social media is the use of IT to support the sharing of content among network of users.

cookies that remain on your device indefinitely are called

Answers

Answer:

Persistent Cookies: Persistent cookies stay on the user's browsing device until the user clears them or until they reach their expiration. Persistent cookies are those that retain information on the user's specific preferences so that we can provide a “personalized” user experience.

Explanation:

I hope that this helps, if you have anymore questions, please, feel free to ask. I hope that you have an amazing rest of your day. ;D

Cookies that remain on your device indefinitely are called persistent cookies.

What are persistence cookies?

Cookies that remain on your device indefinitely are called persistent cookies.

These cookies are stored on the user's device even after the browser is closed, and can be used to track the user's activity over time.

We have,

Persistent cookies:

It can be useful for storing information such as login credentials or user preferences, as they allow the user to remain logged in or have their preferences saved between browsing sessions.

However, they can also be used for tracking and advertising purposes, which has raised concerns about online privacy and security.

Many web browsers offer options for managing cookies, including the ability to delete or block persistent cookies.

Users can also use browser extensions or privacy tools to control how cookies are used on their devices.

Thus,

Cookies that remain on your device indefinitely are called persistent cookies.

Learn more about persistent cookies here:

https://brainly.com/question/29608733

#SPJ5

in classification problems, the primary source for accuracy estimation of the model is ________.

Answers

Answer:

In classification problems, the primary source for accuracy estimation is the confusion matrix (or classification matrix or contingency table)

did someone really hang themselves on wizard of oz

Answers

i think so the cast is def scary

An HTML sitemap provides a list of internal links on a website accessible to users

Answers

The answer is true edg 2025 The distinction between XML and HTML sitemaps is that XML sitemaps are written for search engines, whereas HTML sitemaps are written for humans. An XML sitemap is designed especially for search engine spiders. An HTML sitemap helps lost human users locate the page they’re searching for on your website. SEO Site Checkup’s sitemap tool is a fast and simple one to try – simply enter your URL and let them see if they can locate your sitemap. Second, you could try crawling your website with Spotibo by creating a free account. Then, to see if you have a sitemap, you’d have to search at just the XML file forms

Describe the type of gameplay seen during early video games

Answers

Answer:

2d?

Explanation:

It could be 2D because most games such as early Mario and Donkey Kong games were 2D games.

Answer: Arcade Machines

The earliest gameplay video games were arcade machines such as Mario, Donkey Kong, and PacMan. Most early video games being produced by Nintendo.

did someone actually hang themselves on the wizard of oz set

Answers

No - its a rumour started since the films 50th anniversary in 1989.

most file managers include a way to create a folder through the save dialog box. true or false?

Answers

Answer:

false because most of the file managers just keep Everything organized by dates, years, and everything like that

Explanation:

which nims component includes the incident command system

Answers

Answer:

The NIMS Command and Management component

Explanation:

aaron has started a food blog on which he wants to post his recipes. he wants to place a high-quality image next to each cooking step. which file format should he use so that users do not experience a lag when loading the high-quality images on the website?

Answers

The picture format which should be embraced on Aaron's blog in other to ensure that customers have smooth viewing experience while also preserving the quality of uploaded images is the JPEG format.

File format refers to the manner in which files are encoded. Picture files have several encoding types such as JPEG, JPG, GIF, PNG and so on.

Since, Aaron is considering images which loads quickly without lagging, then he'll need to compress the size of the uploaded images so that they have smaller file sizes.

In other to preserve image quality while working down the size of the image, the JPEG image format, produced good quality images with smaller file sizes compared to other file formats.

Therefore, the file format which should be adopted by Aaron ls the JPEG picture format.

Learn more :https://brainly.com/question/24941137

which type of broadband internet offers connections nearing the speed of light?

Answers

Answer:

FiberOptic connections

Explanation

One of the fastest data transfer methods for computers.

The type of broadband internet that offers connections near the speed of light is fiber-optic. The correct option is c.

What is fiber-optic?

Information can be sent from one location to another via optical fiber. Communications over the internet, cable television broadcasts, and telephone calls all use it.

Data transmission through the internet is one typical application. Most likely, a fiber optic cable connecting my computer and Brainly's servers to your browser allowed it to obtain this webpage.

Fiber optics is used in communications, medicine, optical inspection, lighting, and in the making of sensors. The Internet is a connection of computers from different places without wires. It is transferring information.

Therefore, the correct option is c. fiber-optic.

To learn more about fiber-optic, refer to the link:

https://brainly.com/question/10062531

#SPJ2

The question is incomplete. Your most probably complete question is given below:

Cable.

DSL.

fiber-optic.

satellite.

1 of 10
The biggest difference between scholarships and loans is that
scholarships are considered _____ but loans must be paid back.
easy money
liquid assets
free money
sound investments

Answers

Answer:

free money

Explanation:

scholarship money you can keep and do what you please with it. its not really easy money since its actually difficult to get scholarships, and the other ones dont make sense because how do you invest in a scholarship? theyre not liquid assets either

excuse me i am going into my A levels and i need help in picking what further pure mathematic units i need to pick since i am studying ICT.

Answers

Answer:

i dont know bout math units but subjects for ict include

microcomputer technology, and systems resource management ,computer systems organization.

Explanation:

____ is the state of not sharing information with or being observed by others.

Answers

Answer:

Privacy(guessed ,not really sure about it).

A pennant-shaped sign means you are in a _____ zone.

Answers

Answer:

The pennant-shape is only used as a road sign to signal a no-passing zone. No passing zones are stretches of roadway where drivers are not allowed to move into the adjacent lane to pass a vehicle in front.

What is LinkedIn?

A job search website
A virtual job fair
A recruiter website

Answers

Answer:

A job search website.

Explanation:

Hey is anyone else getting this? Don't mind the answer.

Answers

Answer:

Getting what? I don't get what you mean.

Maybe the dog is in heaven…therefore it’s infinity miles while the other has a certain number of miles because it is alive and on the earth..??


Not 100% sure but I think that’s why.
Other Questions
listen to john Williams melody\. do you recognize any of the themes or melodies? All of the animals listed below are usually found in the same geographic region as the animals shown in the photos aboveexceptA. rabbitsB. coyotesC.D. elkraccoons The terms representative democracy and republic are used when describing America's government. Choose the THREE features of the type of government these terms are used to describe. A. The power of the government belongs to the citizens.B. People must have access to free and fair elections.C. Every citizen is required to vote for representatives.D. Limits are placed on government and lawmakers.E. Every citizen gets a direct vote on every issue. which categories make up the contingent workforce? What are some environments or countries that you can think of that have extreme conditions? plsss help giving brainliest and 100 points Minutes That MatterBy Kristina WaltzAs a teenager, whenever you have gone out with friends or traveled away from home, you've likely been asked to call and check in every once in a while. Most of us probably don't think much about doing so. We may even talk on the phone with friends or family members several times a day. But pretend for a moment that you are a soldier in the military. You have been sent overseas for several months, away from all of your family and friends, in order to serve your country. You might imagine that the ability to call home and talk with your loved ones would be something to look forward to. But what if those phone calls left you with a $7,600 phone bill?When 14-year-old Brittany Bergquist and her 12-year-old brother Robbie, of Norwell, Massachusetts, saw a news story about a soldier who found himself with just this problem, they decided to help. Robbie recalls, "We were taken aback and wanted to make sure he didn't have to pay that cell phone bill!" They began by raising money. Brittany and Robbie donated 14 dollars of their own savings and collected seven dollars from friends. A local bank heard about what they were doing and donated $500. But $521 was nowhere near the amount needed to help the soldier pay his bill. So Brittany decided to send donated cell phones to the soldiers. This way, they would have their own phone to use when calling home, which would be less expensive. Brittany and Robbie collected as many old cell phones as they could. But there was a problem. Because of security concerns, the Pentagon would not allow the phones to be sent overseas. Brittany and Robbie were determined, so they came up with another idea. They found a cell phone recycler in Michigan who would pay them five dollars for each phone they sent in to be recycled. Using that money, they could buy pre-paid phone cards to send to the troops.It didn't take long for the Cell Phones for Soldiers program to take off. Today, there are over seven thousand locations to drop off your old cell phone. The program has recycled over ten million phones since it was started in 2004. Over 180 million minutes of talk time have been given to the soldiers, and each week, about twelve thousand calling cards are sent. The Bergquist family still runs the program largely on their own. Brittany says that her involvement with the charity has helped her learn how to build awareness for a cause, and form relationships with companies that can help. Although she admits that she gets nervous when she has to do something that is out of her comfort zone, she has learned that it is important to overcome her fear so that her charity can continue to grow. She says founding Cell Phones for Soldiers "... has been the most positive and motivating experience of my life..." and that, "It's unbelievable and overwhelming to know that we've been able to help out families that we're never going to see; that we've had an impact on their lives." Explain what the core muscles do and why it's important to have a strong set of core muscles. do not copy and pace Question 5 of 5Which idea was not supported by Dalton's atomic model but was supported inall later atomic models?A. A central, positive nucleusB. Electrons in orbitsC. Positive and negative partsD. Electron clouds During which era did dinosaurs become extinct? ABCD is a parallelogram with diagonal AC. If the measure of angle CAB is 21 and the measure of angle ADC is 125, what is the measure of angle DAC? Parallelogram ABCD with diagonal AC; the measure of angle ADC is 125 degrees, and the measure of angle CAB is 21 degrees. 73 62 42 34 After the Civil War, whichReconstruction plan was the easiest andmost forgiving towards the South as faras punishment?A. Lincoln'sB. RadicalsC. Johnson's the university has decided that for the following year identify two ways in which carbon-12 carbon-13 and carbon-14 are alike (cos2x-1). sin 3x = 0 Pls help, and fast!!! i clicked a on accident 1. What tone is used in paragraph 2? Read the excerpt below andlist three adjectives to describe the narrator's tone.I think it was his eye! yes, it was this! One of his eyes resembledthat of a vulture-a pale blue eye, with a film over it. Whenever itfell upon me, my blood ran cold; and so by degrees-verygradually-I made up my mind to take the life of the old man, andthus rid myself of the eye for ever. Multiply.(2.04)(4.3)Enter your answer in the box. At the end of the semester, Andrea has to give an oral report in front of the whole class. She practices, but when she stands up, she gets so nervous she drops all of her notes. She is embarrassed and cannot seem to put them back in the proper order. After the presentation, she whispers to her classmate, "This is the worst day ever. I am so embarrassed.What response would express empathy toward Andrea?Hopefully you will still get a good grade.I dont think anyone was paying attention anyway.That looked really painful. Do you want to talk?Next time, have a backup plan. !30 POINTS! How can I use this trapezoid to prove the Pythagorean Theorem? Please help me with this homework