define a touch-sensitive pad and state one use​

Answers

Answer 1

Answer:

A touch pad is a device for pointing (controlling input positioning) on a computer display screen. It is an alternative to the mouse. Originally incorporated in laptop computers, touch pads are also being made for use with desktop computers. A touch pad works by sensing the user's finger movement and downward pressure.

Explanation:


Related Questions

Which type of cybercriminal is the most likely to create malware to compromise an organization by stealing credit card information

Answers

Not naming countries or people, but its mostly Nation State Actors / Hactivits. Eh, not sure about hactivits but mostly Nation state actors.

Please help me on this it’s due now

Answers

it’s C


i had the same thing and i picked c

The use of smart cranes enables transportation companies to do all of the following except manually load or unload crates onto a train with several workers. Thus, the correct option for this question is C.

What are smart cranes used for?

The features of smart cranes not only support the crane operators but also provides service personnel and terminal operators. They are used to easily accessible crane data, maintenance intervals can be monitored, service work/error analyses simplified and handling rates evaluated more quickly.

According to the context of this question, easy and efficient steering and regulation of heavy loads. It involves the utilization of easy guiding of loads, especially when utilizing a remote control system. Efficient handling of heavy loads with two cranes in tandem operation.

Therefore, the use of smart cranes enables transportation companies to do all of the following except manually load or unload crates onto a train with several workers. Thus, the correct option for this question is C.

To learn more about Transportation, refer to the link:

https://brainly.com/question/27667264

#SPJ7

Which two statements accurately describe this computer program? Click all that apply.
A. Clicking the green flag is the event that triggers the cat to move.
B. The code is written in C++, a block-based programming language.
C. The programmer refused a module to make the cat move and make noise.
D. There are two sprites, wearing cat and butterfly costumes.

Answers

Answers:
C & D

Explanation:
Clicking the green flag is not the event that triggers the cat to move, as the orange "event" block says to trigger when the sprite is clicked, and this is not C++.

Clicking the green flag is not the event that triggers the cat to move, as the orange "event" block says to trigger when the sprite is clicked, and this is not C++.

What is Computer program?

Instructions must be expressed clearly and precisely since computers can only understand particular instructions or commands in the language that the user is programming them in.

Some computers require users to develop programs using blocks while others demand text-based languages since not all computers can comprehend the same things.

In contrast to computers, your acquaintance would be able to read beyond any spelling and grammar mistakes or request clarification if your handwriting was illegible if you opted to write down the instructions for them.

Therefore, Clicking the green flag is not the event that triggers the cat to move, as the orange "event" block says to trigger when the sprite is clicked, and this is not C++.

To learn more about Computer programe, refer to the link:

https://brainly.com/question/14618533

#SPJ7

Which xxx completes the code to read every integer from file "data. txt"? fileinputstream inputstream = null; scanner infs = null; int total = 0; inputstream = new fileinputstream("data. txt"); infs = new scanner(filebytestream); while(xxx){ total = total + infs. nextint(); } system. out. println("total: " + total); group of answer choices inputstream. hasnextint( ) total != 0 infs. hasnextint( ) infs. eof( ) == false

Answers

Answer:

total+ infs . nex (xxx){total}

Explanation:

this is correct theres nothing wrong

Discuss what is an embedded system. Explain the relative advantages and disadvantages of an embedded OS based on an existing commercial OS compared to a purpose-built embedded OS.

Answers

Answer:

An embedded system is a computer system a combination of a computer processor, computer memory, and input/output peripheral devicesthat has a dedicated function within a larger mechanical or electronic system.

Advantage

Simple to deliver higher creation.

Less costs for per bit of resultant.

It has not many interconnections.

It has Better steady and Higher speed.

It has Higher dependable.

To use for one errand.

Disadvantage

Once configured, these systems cannot be changed. ...

They are hard to maintain. ...

Troubleshooting is difficult for embedded systems. ...

Because these systems are made for specific tasks, hardware is limited

How is distributed ledger technology (DLT) used in a blockchain?
A. To change the ownership of assets in blockchains
B. To encrypt transactions into blocks of information
O c. To store assets in different financial institutions
O D. To keep records of transactions in different places

Answers

Answer:

I believe the answer is D. To keep records of transactions in different places.

Explanation:

Choose the answer.
The ____ ... meeting is a great way to bring everyone involved together to discuss
the project. Some topics of this meeting include project vision, roles and
responsibilities, team buildings, team commitments, and rules.

Answers

nazlian monsters died and died and died again of heart attack

The element of website design that refers to the website's aesthetic appeal and the functional look and feel of the site's layout and visual design is known as _____.

Answers

The element of website design that refers to the website's aesthetic appeal and the functional look and feel of the site's layout and visual design is known as context.

What is webpage context?

The web page context is known to be a kind of special ID that is is formed with all the new page load event.

The context of a website is known to be the point or place where a person can show their visitors that one care. It gives a kind of website's aesthetic appeal and the functional look.

Learn more about website design from

https://brainly.com/question/25941596

You are consulting with a medium-size company about endpoint security solutions. What advantages does a cloud-based analytics platform have over an on-premises solution that relies on signature updates

Answers

The advantage of cloud-based analytics platform  is known to be backed up by machine learning that can use a lot of efficient behavioral-based monitoring and alerting system in its work.

What is cloud data analytics platform?

Cloud analytics is a term that connote the use of analytic algorithms in the services in cloud against data in a private or public cloud which is often used to send or deliver a data/ result that one  needs

Cloud analytics is good because it uses Advanced persistent threat (APT) malware and other techniques to overcome signature-based detection. The platform is known to be backed up with machine learning, which uses an efficient behavioral-based monitoring system.

Learn more about cloud-based analytics from

https://brainly.com/question/17273521

A _____ is a collection of (potentially) thousands of computers that can respond to requests over a network

Answers

Answer:

server or supercomputer

Explanation:

which changes the angle of a picture skew or select or find

Answers

Answer:

This article discusses about some very basic and generalized techniques for detecting image skew. Definitely there are much advanced algorithms to detect skew, but those will not be covered in this article.

Explanation:

Which sentence contains an error?


(Not about technology but about journalism. Answer fast please. Thank you)

Answers

Answer:

The correct answer is A

Explanation:

All the rest of them make sense but letter A so your correct answer is A

Good Luck

Imagine that you’re partner in a business firm that sells computers and other electronic goods. As part of your business organization’s Corporate Social Responsibility drive, you have to present a slide show to the retailers (and the general public) about how to dispose of end-of life electronic goods in an eco-friendly manner. Perform online research and describe available media options to present the slide show.

Answers

The best way to dispose of electronic goods is by recycling raw materials and correctly disposing of the remaining hazardous materials.

What does eco-friendly disposal imply?

This implies using disposal practices that have a low negative impact on the environment.

How do you dispose electronic goods?

The best way to do this is:

Appropiately collect electronic goods that cannot be used anymore.Identify the materials or parts that can be recycled as this reduces the number of new parts that will be manufactured.Separate the recycling materias from those that cannot be recycled.Dispose of the remaining materials in the best way depending on the material as some of these are hazardous and require special disposing practices.

Learn more about recycling in: https://brainly.com/question/11861824

Windows is a GUI Operating System, what is the other type?

Answers

Answer:

If you are looking for a different type of GUI operating system then :

Linux or mac

if you are looking for a different type of operating system (non-GUI):

Command-line interface

Explanation:

Help!! When was technology made?

Answers

Answer:

3.3 million years ago, if you mean technology in general, if you mean computer technology, then 1837 should be your answer.

Answer:

3.3 million years ago the first tools were made but technology is older than our specis itself

Explanation:

well even the use of rocks as wepons are technology

Can someone please help me? My Brainly isn't working correctly and I need help. I can't see the home page... all I can see is in the pic... Please help me!!!

Answers

Answer:

ok. If you refeshed then now click this

Explanation:

1. The running configuration is also known as the _____________ (Select Two) a. Startup config b. Working configuration c. Current configuration d. Backup configuration

Answers

Answer:

1. The running configuration is also known as the b. working configuration

c. current configuration

Explanation:

hopes this help (:

O B. the bulk of a person's income.
a
C. a person's excess income.
Those taking illegal drugs, or using a prescription drug without a medical need, are likely ...
A. to be making a calci

Answers

im confused by the formatting of this- maybe type it again ;-;

In two-dimensional arrays, the _____________ is always listed second.

Answers

Answer:

row

Explanation:

What are enterprise messaging solutions most often used by business teams
for?
A. Cataloging and printing shipping labels for product deliveries
B. Sorting through and deleting a large number of company emails
C. Working on projects and communicating with each other to stay
updated
D. Distributing and tracking the use of computers in the workspace

Answers

Answer:

C. Working on projects and communicating with each other to stay updated

Explanation:

Working on projects and communicating with each other to stay

updated. Therefore, the correct answer is option C.

An corporate Messaging System (EMS) is a system that allows "program-to-program" messaging across corporate applications and systems.

Company messaging is typically used to integrate several company systems. It is a software interface that allows one programme to send loosely connected asynchronous data (messages) and store it in a message queue until the receiving programme can process it.

Typically, enterprise messaging falls under two categories:

Enterprise Messaging is classified into two types: promotional and transactional.

Bulk SMS messages are used to market a company's products and services. Bulk uploads, templates, phonebooks, scheduling messages, viewing delivery reports, and importing text and excel files are all common capabilities.Transactional SMSs: The SMS is typically sent by the sender's name (brand name) and is available 24 hours a day, seven days a week.

Advantages of deploying an EMS:

Secure Messaging - The secure transmission of critical information and files to smartphones or feature phones.Notifications, reminders, and alerts are delivered globally.Two-way interactive SMS is commonly used for appointment confirmation, business process automation, surveys, and voting campaigns.Campaign Control/Management - Marketing programmes can be readily managed and measured in terms of performance.Delivery Assurance - Access to detailed message delivery can be gained.Customer preferences can be used to create customised messaging programmes using intelligent analytics and reporting.

Therefore, the correct answer is option C.

Learn more about the enterprise messaging solutions here:

https://brainly.com/question/32271386.

#SPJ3

The semantic network model predicts that the time it takes for a person to retrieve information about a concept should be determined by:.

Answers

Answer:

the distance that must be traveled through the network.

Explanation:

The semantic network model predicts that the time it takes for a person to retrieve information about a concept should be determined by the distance that must be traveled through the network. The correct option is B.

What is semantic network model?

In the late 1960s, Allan Collins and Ross Quillian developed the network model of semantic memory organization.

According to this network model, information nodes (categories) are linked to one another via strong and weak links. Priming enables our memory to prepare related information for retrieval.

A semantic network is a type of knowledge structure that shows how concepts are related to one another and how they connect.

Semantic networks mine data, connect concepts, and draw attention to relationships using artificial intelligence (AI) programming.

According to the semantic network model, the time it takes a person to retrieve information about a concept is determined by the distance that must be traveled through the network.

Thus, the correct option is B.

For more details regarding semantic network model, visit:

https://brainly.com/question/29317050

#SPJ2

Your question seems incomplete, the probable complete question is attached below:

It is against the law for drivers ____________ to use a wireless communication device while operating a motor vehicle.

Answers

Answer:while operating a motor vehicle

Explanation:

3. Which symbol shows one character in criteria for query:
(a) <
(b) >
(c)?

Answers

Answer:

The answer is A

Explanation:

A ( which is a less than sign) is used for all smaller values.

Do network packets take the shortest route?

Answers

Answer:

The packet will take a shorter path through networks 2 and 4

Answer:The packet will take a shorter path through networks 2 and 4, but networks 1, 3, and 5 might be faster at forwarding packets than 2 and 4. These are the kinds of choices network routers constantly make.What is shortest path routing in computer networks?

The goal of shortest path routing is to find a path between two nodes that has the lowest total cost, where the total cost of a path is the sum of arc costs in that path. For example, Dijikstra uses the nodes labelling with its distance from the source node along the better-known route.

Explanation:

Which denial of service (DoS) attack generates a large number of ICMP echo requests from a single request, acting like an amplifier and causing a traffic jam in the target network

Answers

The denial of service (DoS) attack that generates a large number of ICMP echo requests from a single request, acting like an amplifier is a  fraggle attack.

What does a Fraggle attack function as?

A Fraggle Attack is known to be a type of a denial-of-service (DoS) attack that entails the sending of a huge amount of spoofed UDP traffic to a given  broadcast address of a router that is often seen in a given network.

Note that  It is said to work in a similar way like the smurf Attack, that often uses spoofed ICMP traffic and as such, the denial of service (DoS) attack that generates a large number of ICMP echo requests from a single request, acting like an amplifier is a  fraggle attack.

Learn more about DoS attack  from

https://brainly.com/question/13068595

#SPJ1

is an amount paid based on the volume of products or services that a salesperson sells

Answers

Answer:

should be commission

Explanation: i took this class a while back, hope this helps man

A program that runs each line one at a time in order is called?

Answers

the answer is a one liner program

HELP PLEASEE!!
True or False. The POP is a bank of switches that allows many users to connect to the ISP at the same time.

Answers

Answer:

yes it is true. the pop is a bank of switches that allows many users to connect to the ISP at the same time.

what is computer
what is computer ​

Answers

Hi! Computer is an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.

The person who decides how to organize data into tables and how to set up the relations between these table is the?
database manager
database technician
databaseadmistrator
database designer

Answers

Database manager decide how to set up table
Other Questions
100 Points!!!! Please help, Will Mark BRAINLIEST!!!!!! Which statement about the observed results of the double-slit experiment is true? O Waves that are out of phase constructively interfere to create bright bands.O Waves that are in phase destructively interfere to create bright bands.O Waves that are in phase constructively interfere to create bright bands.O Waves that are out of phase constructively interfere to create bright bands. Find the area of the shaded regionAnswer ASAP! but only if you know 100%, and whoever gets it right can have brainliest Comment trouves-tu? Using the adjectives to describe clothes. Choose a masculine and a feminine noun using four adjectives to describe the clothing item. 1 sentence using Comment trouves-tu le pantalon. Write four adjectives. Totaram believes that the government can read his thoughts and is spying on him. He hears voices telling him that the government is plotting to take his house and imprison him because he is a superhero. Totaram is most clearly suffering from solve for z: -42z^2 = 14z Why is Fraud Risk Management important?A. Your Company's Vulnerability to Fraud is a "known unknown "B. Fraud is not very common.C. Fraud can cause catastrophic lossesD. Fraud prevention decreases confidence Kevin ours more than emily each time they work together. Using this information, complete the tableSorry for bad quality A teacher is 15 y.o. older than her student. In 15 years, the ratio of their ages will be 3:2. Find their present ages Students in Mrs. Andersons health class are learning about how exercise affects your heart rate. Twelve students ran around the school track for different lengths of time. Then they measured their heart rates in beats per minute. Heart Rate Record Minutes Heart Rate (bpm) 7 121 8 136 7 122 4 96 3 90 6 120 7 118 4 98 2 84 5 110 7 118 8 128 Find the correlation coefficient of the data. Round to the nearest hundredth First drop down : 1. Cylinder 2.sphere Second drop down: 1.divide by 22. Divide by 43.multiply by w2Third drop down: 85 10070 (HELP please!!!) Why was the landmark case Briggs v. Elliott important? A) The case was part of a decision that signaled the beginning of the end of segregation in public schools. B) Lawmakers in South Carolina took the case as approval by the courts for continued segregation. C) The Republican Party began to lose credence in South Carolina, starting with the decision in the case. D) The court's decision in this case represented the success of those who opposed the integration of schools. giving brainliest please help! Most modern forms of transportation are powered by fossil fuels. Carbon dioxide, methane, carbon monoxide, and other gases are released into the atmosphere during the production and combustion of these fuels. How might these gases cause climatic changes?. Select the choices that define extreme nationalism.Group of answer choicespride in one's country to the point of excluding or even hurting otherspride in one's country to the point of running for Presidentarises when citizens perceive a threat to their way of lifeshared culture, language, and religion The volumes of two similar cylinders have a ratio of 27:64. The area of the base of the smaller cylinder is 18inWhat is the area of the base of the larger cylinder?Enter your answer in the box. What is the least common denominator for the fractions 1/3 and 1/6 what is the sum of 1 To 101 only positive integers pease fast Find the volume of a pyramid with a square base, where the perimeter of the base is 14 m and the height of the pyramid is 8.8 m. Round your answer to the nearest tenth of a cubic meter. Which of the scatter plots below shows the most accurate line of best fit?A. ZB. XC. WD. Y