Answer: Mouse: to clean a traditional Mouse twist the plate that holds the ball and remove the ball then use a damp cloth to wipe the ball played and the surfaces and edges of the mouse to clean it Optical Mouse use the damp cloth to wipe the upper and lower surface of the mouse the lands area and ages of the mouse.
Keyboard: first shake the keyboard after turning it upside down to remove the does that might have accumulated in the slots and Cavities use a compressed air spray to blow away the contaminant between the keys of a keyboard. In addition spray with disaffected and wipe the keyboard throughly to remove all germs.
Optical drives: after a long. Of use the laser on an optical drive gathers dust and dirt therefore uses lens cleaner disc to remove contaminants from the laser in addition remove the optical drive in clean the tray with a damp cloth finally use a dry cloth to dry the tray before placing it back in the drive.
Computer display: to clean an LCD monitor use soft dip cotton cloth to gently wipe the screen if the computer display has a CRT screen dampen a cloth with the glass cleaner and gently wipe away the dirt from the screen.
Printers: use a damp cotton cloth to clean the inner and outer surfaces of the printer if there are cleaning Buns on the printer used in forehead cleaning and Cat cartridge cleaning in case he's cleaning buttons are not present when the computer contact the printer vendor for accurate directions to clean it.
Explanation: Here are some of the procedures that I would used to keep the peripheral devices clean.
How do you add a section break that would start the new section on the same page?
Answer:
Click the Page Layout tab, click Breaks, and choose Continuous.
Question: 8
Which of the following is a benefit of the fault-tolerant nature of Internet routing?
The ability to use a hierarchical naming system to avoid naming
conflicts
The ability to provide data transmission even when some connections
between routers have failed
The ability to resolve errors in domain name system (DNS) lookups
The ability to use multiple protocols such as hypertext transfer
protocol (HTTP), Internet protocol (IP), and simple mail transfer
protocol (SMTP) to transfer data.
Answer:
The ability to provide data transmission even when some connections
between routers have failed
The statement which represents a benefit of the fault-tolerant nature of Internet routing may include the ability to provide data transmission even when some connections between routers have failed. Thus, the correct option for this question is B.
What is Internet routing?Internet routing may be defined as the process of transmitting and routing IP packets over the Internet between two or more nodes. It is identical to standard routing methodologies but incorporates packet routing techniques and processes on external networks or those that are hosted or Internet-enabled.
The fault-tolerant nature of Internet routing determines a benefit in the capability to deliver the transmission of data even when some connections between routers have failed without any disconnection and disturbances. Through this process, the selection of a path for traffic in a network or between or across multiple networks has been successfully carried out.
Therefore, the correct option for this question is B.
To learn more about Internet routing, refer to the link:
https://brainly.com/question/24812743
#SPJ5
9
How many total numbers can be represented with an 8-bit binary (base-2) system?
А. 127
В. 12В
Ос. 255
OD. 256
Answer:
D:256
Explanation:
Trust me
Answer:
The correct answer is 256
Explanation:
2^0=1
2^1=2
2^2=4
2^3=8
2^4=16
2^5=32
2^6=64
2^7=128
1+2+4+8+16+32+64+128=255, but 00000000(which is 0) also counts as a number, so the answer is 256.
Fill in the blank with the correct response.
People in STEM careers are considered
thinkers who reach conclusions through sound judgment and reasoning
Save and Exit
Next
What goes in the blank between considered and thinkers
Answer:
logical
Explanation:
Answer:
logical thinkers
Explanation:
they are logical thinkers because they know whats going on
Explain the four basic operation performed by every computer
Answer:
computer is a machine that, under a program's direction, performs four basic operations: input, processing, output, and storage. A program is a list of instructions that tells a computer how perform the four operations.
Answer:
A computer is a machine that, under a program's direction, performs four basic operations: input, processing, output, and storage. A program is a list of instructions that tells a computer how perform the four operations.
Explanation:
answer im timed i'll mark brainliest
Robert is creating a newsletter in Word and needs to have the ultimate flexibility on the placement of images and text. Which component is treated like an image but still allows free-flowing text? shapes styles pictures text box
Answer:
The answer is shapes.
Explanation:
Answer:
D: Text box
Explanation:
Which character is often used to identify registered trademarks and is available on the Insert tab and Symbols group?
Answer:"TM"
Explanation:
Answer:
TM
Explanation:
because its used to identify, trademarks and etc. mark brainliest! i also got 100 on the quiz
Which of these jobs would be most appropriate for someone who majors in information systems?
Answer:
An Architect, System Designers, IT business analysts etc...
Explanation:
Answer:An Architect and System Designers someone who studies complex work
Explanation:
how many 16ths are in 3/8 of an inch
Answer:
0.375
Explanation: i think
html use for web page deaign true or false
PLEASE GIVE BRAINLIST
False
HOPE THIS HELPED
Enhancing personal identity is often a factor in making a career choice
What is the greatest common
factor of the following three
numbers?
12, 18, 32
Answer: 2
Explanation:
Which features can Danica use to fix the issue
Answer:
Hope you uderstand this answer
How globalization is related to communication technology?
Answer:
hey mate there is your answer
Which type of evidence should victims collect to help officials catch cyber bullies
Answer:
(c)social media usernames
Explanation:
The type of evidence should victims collect to help officials catch cyber bullies is social media usernames.
What do you mean by the cyber bullies?Cyberbullying is when someone is harassed, threatened, or intimidated through a cell phone, instant messaging app, email, or social networking sites.
Children frequently engage in cyberbullying because they have access to these technologies at an earlier and earlier age.
Cyberbullying victims may have a variety of negative consequences, such as mental health problems, subpar academic results, a desire to quit school, and even self harm thoughts.
Bullies themselves at a higher chance of developing problems like drug abuse and engaging in violence.
Therefore, the type of evidence should victims collect to help officials catch cyber bullies is social media usernames.
To know more about the cyber bullies, visit:
https://brainly.com/question/4689569
#SPJ2
Program code that can be evaluated to a value is called a(n):__________
Answer:
The answer is "expression"
Explanation:
An expression is a term or phrase, which is commonly used to transmits certain concepts, perceptions as thoughts. It is a mixed form of more than one operands, which is used to determines the values. It is a legal symbol, that combines the representing word like, operators, constants, and variables, that is arranged by language law.
please find the attachment for example.
how many types of fundamental movement are there
Answer:
12
Explanation:
The process of images displayed on the screen that enables the user to interact with the computer is called what?
Time-sharing
Networking
Graphical user interface
Program execution
How do I persuade my parents to allow me to have social media? I will be 15 in a week or so, so I am old enough. I'm pulling my grades up, I help around the house, I am in honors classes, I help my siblings out with school, I help make dinner, I just help a lot. What should I do?
Answer:
my explanation is above my comment :)
Explanation:
Audiovisual means that a presentation combines film and photos.
true or false?
Answer:
False
Explanation:
Using both sight and sound.
Its false , as audio means it should have music or sound tracks in it.
24. A key on a keyboard of a computer
has two symbols on it, top and down.
Which of the following procedures will be
appropriate to use to get the top key?
A. Hold down the Shift key and
press the identified
B. Hold down the Alt key and
press the identified key
C. Hold down the Ctrl key and
press the identified key
D. Hold down the Del key and
press the identified key
Answer:
Its A
Explanation:
.................
Which explains extrinsic motivation? motivation in which there is a reward motivation that is personally satisfying motivation that is personally meaningful motivation in which the subject is interesting
Answer:
Motivation in which there is a reward.
Explanation:
Hope this helps God Bless.
The one that explains extrinsic motivation is motivation in which there is a reward. The correct option is a.
What is extrinsic motivation?Extrinsic motivation is characterized as an incentive to engage in an activity based on achieving an external goal, winning a competition, gaining acclaim and approval, or receiving a prize or cash.
The extrinsic incentive includes things like getting paid to complete a task. Even though you might prefer to spend your day doing something else, you are motivated to go to work because you need the rewards from your job to pay your bills.
In this case, your ability to pay for your everyday expenses serves as your extrinsic motivation. Such a desire or incentive is intrinsic if the reward is inherent in the job. However, if the reward is said to be unrelated to the position, the motivation is said to be extrinsic.
Therefore, the correct option is a, motivation in which there is a reward.
To learn more about extrinsic motivation, refer to the link:
https://brainly.com/question/1658150
#SPJ6
The user enters a URL into a web browser, the web browser sends the information to the DNS server to look up the IP address, then the IP address is sent to the web (host) server. What is the final step in the DNS process?
A) The client sends a request to the DNS server.
B) The DNS server the IP adress back to the URL.
C) The process starts over back at the beginning.
D) The web server sends information back to the web broswer.
The final step in the DNS process is The web server sends information back to the web broswer.
What occurs when you enter a URL in one's browser?Note that if you enter a URL into a web browser. The browser is said to search for the IP address for the domain name through the use of DNS.
Furthermore, The browser then sends a HTTP request to the server and the server is known to also sends back a HTTP response back.
Learn more about web browser from
https://brainly.com/question/18455725
Which step is done first to replace existing text in a text box?
•Select the text to be replaced.
•Type new text into the text box.
•Click and drag the text to replace.
•Click an area outside the text box.
The step is done first to replace existing text in a text box is to Select the text to be replaced.
What is a text box used for?A text box is known to be a tool or an object that a person can add to their document and it is the one that p[permits one to lets add type text anywhere in one's file.
Note that based on the above, The step is done first to replace existing text in a text box is to Select the text to be replaced.
Learn more about text box from
https://brainly.com/question/26372855
#SPJ1
Answer:
A. Select the text to be replaced.
Explanation:
hope this helps :)
Language: JAVA Can someone please tell me what the problem to my "main" class is?
I included the errors I received when trying to compile as well as the "Student" class which is used to answer the problem.
Here's the expected output:
Bob : 1234
Sue : 5678
Pat : 2468
Then it accepts user input: Chris
Then it outputs the updated objects:
Bob : 1234
Sue : 5678
Pat : 2468
Chris
Bob : 1234
Sue : 5678
Chris : 2468
Answer:
please find the attachment of the correct code:
Output:
Bob : 1234
sue : 5678
pat : 2468
please enter a name to replace with pat:
Chris
Bob : 1234
sue : 5678
Chris : 2468
Explanation:
In this code, when we create the class object, that is "stu1, stu2, and stu3" and call the parameterized constructor bypassing the "string and integer" value and print the object value you forget to call the "tostring" method because it is the only method which returns both "string and integer" value.
Which inventor developed a method through which groups of people, instead of just
individuals, could view films at the same time?
Al Jolson
Robert Paul
Edwin S. Porter
Thomas Edison
Answer:
Thomas Edition is the inventor developed a method through which groups of people instead of just individuals,could view films at the same time.
Hope it will help you
Answer:
B: Robert Paul
Explanation:
edg2021
It is not Thomas Edison. He created the Kinetoscope that allows for individuals to watch, "The British inventor, Robert William Paul, expanded on Edison’s Kinetoscope parlors with his film projector, enabling theaters to display movies for groups instead of individual viewing"
A _____ describes two or more computers connected to each other.
computer network
client
server
switch
Answer:
CExplanation:
computer networkWhat is network topology
Network topology is the arrangement of the elements of a communication network. Network topology can be used to define or describe the arrangement of various types of telecommunication networks, including command and control radio networks, industrial fieldbusses and computer networks.
I hope it helps!
Answer:
By definition "Network topology is the arrangement of the elements of a communication network. Network topology can be used to define or describe the arrangement of various types of telecommunication networks, including command and control radio networks, industrial fieldbusses and computer networks."
There are multiple types of network topology that all have different purposes, but they all fall under the same general thing as mentioned above. If you're doing a course about this you'll learn much more in detail about it.. It's way too much to describe here on Brainly so feel free to do some research of your own as well!
Hope this helps and have a nice day!
Some fashion designers use this type of technology to produce clothing.
Select one:
a. 3-D printing
b. dot matrix printing
c. color printing
d. inkjet printing
Answer:
The answer is A. 3-D printing.
Explanation:
As with other industries, 3D printing in fashion offers clothing manufacturers the chance to produce prototypes and final products in a way that saves time, money and manpower. 3D printing in the world of fashion is still very much in the primary stages, but it's certainly something to watch.
Design a webpage on Artificial Intelligence /Augmented Reality. please help me out with these computer programming
Answer:
Using HTML, CSS, and Javascript to create the layout, style it, and program the blog's interactivity respectively. Or use Wordpress without codes.
Explanation:
Designing a blog or a website requires certain knowledge or tools. Programmers use tools like HTML, CSS, Javascript, and other front-end libraries and back-end web frameworks. HTML is used to mark-up the web layout, CSS is used to style beautify the page while Javascript is used to make the page interactive.
Other tools like Wordpress requires little or no skill, since the layout of the webpage is drag and drop and other back-end features can be programmed to it.