A pointing device controls the movement of the ____.

Answers

Answer 1
A pointing device controls the movement of the Mouse Pointer

Related Questions

What are the benefits of using presentations to organize and deliver information?

Answers

Hello.

The benefits of using presentations to organize and deliver information are: it keeps things in order, keeps peoples attention longer, and it looks more professional.

Answer:

quickly created, add visual appeal, easy to update

Explanation:

EDG2021

What is the length of time an ip address is assigned to a switchport called?

Answers

What is the length of time an IP address is assigned to a switch port called? Aging Time

What type of interview would be most likely for the following scenario?

doing a telephone poll to find out how many people plan to vote
selection
information-gathering
problem-solving
persuasive

Answers

I'd say information-gathering but I'm not really sure

Answer:

information-gathering

Explanation:

What should you do when an error message pops up on the screen?

Answers

consult an athourity depending on the situation of run an antivirus check

Why would amazon want to use driverless delivery trucks with 3d printers​ installed?

Answers

Maybe so they would have to pay less workers and for the printers, I have absolutely no idea on that. Lol

propose,two new ,proudly South African ways,which you can visualize that the IoT,can be used at work to make life better.

Answers

1. Internet should be used as a medium of learning.

Through internet, such African people could obtain a lot of knowledge from various fields that provided by more developed countries, and use that knowledge to help the development in south africa.

2. It should be used for utilizing business.

There are a lot of new potential business that could be done because of internet, such as blogging, affiliate marketing, public endorsement through social media followers, etc.

What language used orthogonality as a primary design criterion?

Answers

LIPS a functional language is one in which computations are made primarily by applying function to given program

Microsoft Surface can do all of the following except ______.

organize and trade music files
plan travel routes
purchase goods and services
teleport physical objects

Answers

teleport physical objects
The answer would be 
D) Teleport physical objects.
Hope I could help!

Dialogue is not a characteristic of functional text because...
A) dialogue requires a task to be completed
B) dialogue it's speech between characters, and there are no characters and functional text
C) dialogue provides information to the reader
D) dialogue is not important in the story

Answers

it is b,dialogue it's speech between characters, and there are no characters and functional text 

A summary table in which numerical data are tallied into class intervals or categories.

Answers

The answer is frequency distribution. A frequency distribution is a table that shows the recurrence of different results in a specimen. Every section in the table contains the recurrence or check of the events of qualities inside a specific gathering or interim, and thusly, the table compresses the appropriation of qualities in the example.

When did the digital revolution begin

Answers

anywhere from the late 1950's to the early 1970's

hope this helps!

Answer: 1980

Explanation:

I looked it up

Which of the following roles is responsible for writing programming code?

computer support specialist

software engineer

systems analyst

program manager

Answers

I would say the Software Engineer

Answer:

The answer would be

B: Software engineer

Explanation:

Propose, two new, proudly South African ways, which you can visualize that the internet of things, can be used in at work to make life better.

Answers

1. Internet should be used as a medium of learning.

Through internet, such African people could obtain a lot of knowledge from various fields that provided by more developed countries, and use that knowledge to help the development in south africa.

2. It should be used for utilizing business.

There are a lot of new potential business that could be done because of internet, such as blogging, affiliate marketing, public endorsement through social media followers, etc.

exterior brick veneers are used to support the entire weight of the roof structure

Answers

Final answer:

Exterior brick veneers are not meant to support the weight of a building's roof; structural components like buttresses and iron rods bear the weight and provide stability, especially in large structures with heavy roofs.

Explanation:

The discussion about exterior brick veneers and other structural elements relates to architectural engineering principles. Specifically, it indicates that exterior brick veneers are not the main structural components supporting the weight of a building's roof. Instead, other structural components such as buttresses and iron rods are used to counteract the lateral forces and the downward pressure on the walls, which helps to stabilize larger structures with stone vaulting or heavy roof structures. These elements allow for the distribution of weight and forces to prevent collapse and provide stability to buildings with large spans or heavy loads. This incorporates understanding of materials such as wood, stone, and brick, and how they interact with architectural elements like buttresses, piers, colonettes, and masonry walls.

Final answer:

Exterior brick veneers are typically non-structural cladding and do not bear the weight of roof structures. Structural support is usually provided by internal elements such as load-bearing walls, columns, and buttresses, which counter lateral forces. Modern construction techniques, like steel exoskeletons, also highlight the aesthetic versus structural roles of components.

Explanation:

The statement concerning exterior brick veneers suggests a misunderstanding of their structural role in architecture. Typically, exterior brick veneers do not support the entire weight of a roof structure; instead, they serve as a non-structural cladding. The actual weight of the roof is usually borne by structural elements such as columns, beams, and load-bearing walls. In historical construction, additional support was often provided by architectural features such as buttresses, which countered the lateral forces of the vaulted ceilings, allowing for the stability of the structure as well as the inclusion of large windows for light.

As an example, in the construction of large edifices during certain historical periods, the stability of the structure against the outward thrust of the roof required solid walls and piers. Iron rods were sometimes incorporated as a tension element to counteract this force. Furthermore, implementations like mullions can provide structural support while allowing for larger windows, enhancing the delicate appearance of the masonry.

In modern construction, methods such as a steel exoskeleton are utilized to support innovative forms such as the rotated rhomboid shape of the Soumaya Museum. This method allows the weight of the building to be supported by an external framework rather than by the brickwork itself, which further illustrates the distinction between structural and aesthetic components of a building.

Every file name consists of two elements: a name and a folder. true or false

Answers

This statement is false.

Experienced computer users who need information on advanced topics are likely to need a ____.

Answers

Brainly account. that sure was an easy question.

Consider a 4-drive 200gb-per-drive raid array.what is the available data storage

Answers

It depends on what RAID you're using. Some RAID arrays use multiple drives for redundancy. Therefore, if all four of those drives were on this kind of RAID array, then you would only have 200GB of available storage, as data is duplicated.

In other RAID arrays, speed and performance is the main goal, where data is spit between the four drives, meaning there would be a total of 800GB of available storage.

Finally, you could have a mix between the two if you liked, where 2 drives are paired up in the redundancy RAID, as are the other two. The two pairs are then put up in the performance RAID, allowing for a total of 400GB of available storage.


Long story short, it depends on what kind of RAID you're using, and there are many more RAID configurations than I have mentioned here.

What is the term used to describe a file that data is read from?

Answers

A file from which data is read is a .doc file.

Up to 10 people is a good guideline for the size of your study group.

Answers

The answer is false                                                                .

Answer:

false

Explanation:

Which of the following statements about the use of desktop publishing software is true

Answers

What did you do when you got to school tomorrow and then again I don't want it

The correct statement is that most desktop publishers prefer to create the text portion of their documents in a word processing program and then import it into a desktop publishing file. So, option D is correct.

Desktop publishing software is designed for creating complex page layouts with precision, which is why desktop publishers often use word processing programs for writing text and then import the text for formatting and design. This workflow leverages the strengths of both types of software.

For example, while word processors like Microsoft Word are excellent for writing and editing text, desktop publishing programs like Adobe InDesign allow for advanced layout features such as text wrapping, image placement, and grid layouts, making them ideal for producing publications like brochures or newspapers.

Complete question :

Which of the following statements about the use of desktop publishing software is true?

A. There's no visible difference between pages produced by word processing and desktop publishing software.

B. Most publishers prefer to use their desktop publishing software as their main word processor.

C. Today's professional-strength word processing programs can do everything high-end desktop publishing software can.

D. Most desktop publishers prefer to create the text portion of their documents in a word processing program and import the text into a desktop publishing file.

Jumbograms use the ____ extension header to add an alternate packet length field of 32 bytes.

Answers

Hop by Hop options extension header. 

A system with two dual-core processors has four processors available for scheduling. a cpu-intensive application is running on this system. all input is performed at program start-up, when a single file must be opened. similarly, all output is performed just before the program terminates, when the program results must be written to a single file. between startup and termination, the program is entirely cpubound. your task is to improve the performance of this application by multithreading it. the application runs on a system that uses the one-to-one threading model (each user thread maps to a kernel thread). ⢠how many threads will you create to perform the input and output? explain.

Answers

The controlling thread is all that is needed for I/O in this case. What you've described, although multi-threaded, is a classic IPO (Input, Processing, Output) program.

You have configured a lan with 25 workstations three network printers and two servers the workstations and printers will have dynamically assigned ip addresses and the printers always need to have the same ip address assigned the servers will have static ip addresses what should you instal

Answers

Would introduce and arrange the DHCP which will be utilized to dole out unique IP address and also the DNS server data identified with the workstation and printers. Also, DHCP extension can be designed amid this establishment to arrange the IP deliver range to be utilized by the gadgets in the system, setting the subnet veil, default passage and also the sort of the subnet. I can likewise arrange the server to help IPv6 too amid the establishment procedure. 

Answer:

Dynamic Host Configuration Protocol (DHCP)

Explanation:

Introduce and arrange the DHCP that will be utilized to give out unique IP address and also the DNS server data identified with the workstation and printers. Also, DHCP extension can be designed amid this establishment to arrange the IP deliver range to be utilized by the gadgets in the system, setting the subnet veil, default passage and also the sort of the subnet. One can likewise arrange the server to help IPv6 too amid the establishment procedure.

How has the development of personal computer hardware and software reversed some of the trends brought on by the industrial revolution? briefly discuss?

Answers

There should be no need to have white-collar employers just next to factories thanks to the Information Revolution, and it enabled executives to stay in home, write documents, and send them easily.

There should be no need to have white-collar employers just next to factories thanks to the Information Revolution.

What is industrial revolution ?

Industrial revolution referred to the period in the 18th and 19th century  was the biggest change  in human history, two industrial revolution occurred first and second industrial revolution.

Both first and second industrial revolution  involved in using machines to  make products, they show impact on workers as Workers worked in big impersonal factories.

First Industrial Revolution took place between 1750 and 1850 in Britain, the United States, France, and Belgium and develops a few products like textiles, Shift in production done by hand to use of machines.    

The Second Industrial Revolution took place in the late 1800. Electricity became the primary source of power for homes, factories, and farms.

For more details regarding industrial revolution, visit

https://brainly.com/question/855594

#SPJ2

Write a program that prompts the user to enter a three digit integer and determine whether it is a palindrome number.

Answers

You never said what language to use so here is your answer in Javascript:

<script type="text/javascript">
function checkPal() {
    var reversestr = "";
    var str = window.prompt("Enter a 3 digit number: ");
    var i = str.length;

    for(var j=i; j>=0; j--) {
        reversestr = reversestr+str.charAt(j);
    }
    if(str == reversestr) {
        alert(str+" Is Palindrome");   
    }
     else {
        alert(str+" Is not a Palindrome");
    }
}
checkPal();
</script>

At intersections, especially during inclement weather, the BEST way to ensure other drivers see you is to:

Answers

Keep your lights on

What port number is the web server listening on for the web request?

Answers

80 for HTTP, 443 for HTTPS

It’s important to consider adjusting a user’s social network permissions (or access) because

Answers

You may not want to share access to social networks with other members of your team. Also you may want to adjust your users social permission for security reasons, just to be on the safe side. A stronger network means you have a lower chance of a hacker breaking through your system.

Which ipv6 header field is known as the priority field?

Answers

Traffic Class header field is known as the priority field.

[tex]\fbox{\\\begin{minispace} \bf Traffic Class\\\end{minispace}}[/tex] is known as the priority field of the IPv6 header field.

Further explanation:

The IPv6 is the recent used exchange internet protocol. It is the streamlines variant of IPv4 and removes the extra fields for better communication of network traffic.

Generally, the size of IPv6 header is 40 bytes. The various fields of IPv6 are as demonstrated below:

Upper Layer Protocol Data Unit: It contains the header of upper layer protocol and its payload. Upper layer protocol data unit is 65,535 bytes. If the length of payload is in excess of 65535 bytes, at that point payload is sent by Hop-by-Hop protocol header.

Extension headers: There may be any number of extensions headers in the IPv6 header and size is also variable. Each extension header denotes the next extension header. The last extension header represents the upper layer protocol data unit. The size of IPv6 extension headers has no limit.

The fields in the IPv6 are as below:

Version: The version of IP is 4 bits and put to 6 bits.

Traffic Class: Traffic class is known as priority field of the IPv6 header. The size of traffic field is 8 bits. It has the same functionality compare to IPv4 type service field. The default flow label is 0.

Flow Label: Flow label represents the sequence of packets from source to destination by using Ipv6 routers. The size of flow label is 20 bits. The source and destination can have multiple flows.

Payload length: The size of payload length is 16 bits.  

Next Header: The size of next header is 8 bits.

Hop Limit: The size of hop limit is 8 bits.

Source Address: The size of source address is 128 bits.

Destination Address: The size of destination address is 128 bits.

The below figure shows the  IPv6 and its different fields.

Learn more:

1. How does coding work on computers?  brainly.com/question/2257971

2. Prediction accuracy of a neural network depends on _______________ and ______________. brainly.com/question/10599832  

Answer details:

Grade: College Engineering

Subject: Computer Science

Chapter: Computer Networks

Keywords:

IPv4, IPv6, header, priority, field, traffic class, protocol, data, extension header, payload, hop, source, destination, address, streamline

What is the largest 16-bit binary number that can be represented with unsigned numbers?

Answers

Unsigned numbers don't include negative numbers (one way to remember is that negative number needs minus signed)

So unsigned numbers range from 0 to 2¹⁶-1 = 65535

Therefore 65535 is the largest unsigned 16-bit number.
Final answer:

The largest 16-bit binary number that can be represented with unsigned numbers is 65535.

Explanation:

The largest 16-bit binary number that can be represented with unsigned numbers is 65535.

16-bit refers to the length of the binary number, where 16 bits are used to represent the number. Each bit can be either 0 or 1, resulting in a total of 2^16 possible combinations, which is 65,536.

However, since we are considering unsigned numbers, the range starts from 0, so the largest number is 2^16 - 1, which is 65535.

Other Questions
Which of these statements are true about the Mycenaeans? Select all that apply.Their powerful, massive artworks were a major influence on later Greek art.They arrived in Europe and western Asia in prehistoric times.Their warrior-kings established fortified city-states on the mainland.They were very successful sea traders based on Crete. Joanne buys a rug with an areas of 35/4 square meters. The length of the rug is 7/2 meters, What is the width , in meters, of the rug? what was England's first permanent colony in north america Fill-in the Blank: Write the word that best completes each statement.6. All organic compounds contain ___________________.7. Carbon has _________ valence electrons allowing it to _________________ easily with other molecules. 8. ______________ is the ability of water to bond to itself.9. ______________ is the ability of water to bond to other molecules. 10. A _________ molecule has a slightly positive side and a slightly negative side. 11. Matter is anything that occupies _____________and has ________________. Foods like hard candy, soda pop and candy bars are made of refined A: amino acids B: proteinC: sugar After crossing the Delaware on Christmas night, 1776, Washington and his troops were victorious in which two battles? Bunker Hill TrentonQuebecCamden MontrealPrinceton The waitress and the hostess at a restaurant share the tips at the end of the shift the average amount earned in tips between the two of them is 50$ the waitress gets $30 and the hostess gets $20 if they countine to earn money at this rate how many dollars will the waitress receive if they earn 200 at the end of the shift A service that is rarely provided, unusual, variable, or new may require this type of report to assist in the determination of the medical appropriateness of a service and indicates the nature, extent, need, time, effort, and equipment necessary. The first step in the descriptive linguistic study of a language is to ECONOMICS: Opportunity Costs: Suppose on Friday night you have a choice to go either to a Katy Perry concert or a Lady Gaga concert. You won a free ticket to see Katy Perry. You would pay as much as $200 to see Lady Gaga perform, but tickets to her show cost $100 . Assume that you end up going to the Katy Perry concert.Since you went to the Katy Perry concert, you must be willing to pay at least $_____ to see Katy Perry. The members of the military appointed by roman emperor augustus to protect the palace and the emperor were called the Why would Homer plessy tell the conductor he was colored when he knew it would lead to his arrest? what is 22.62 rounded to the nearest tenth How many twentieths are in five halves What are the four weak (noncovalent) interactions that determine the conformation of a protein? How exactly would I have to check my work for -x^2 = -36? The answer is 6 right? do 4 times 21 in expanded form A company sells boxes that are 2 3/8 feet high, 3 5/8 feet long and 1 7/8 feet wide. John has a storage room that is 8 feet wide, 10 feet deep, and 12 feet high. You may rotate the boxes so that the width and length are interchanged, but the boxes may not be laid on their sides. What is the maximum number of boxes that he may stack on top of one another? how can molecular evidence show species relatedness express $15 for 10 gallons a unit rate Steam Workshop Downloader