What are the basic Mouse actions called and how are they executed

Answers

Answer 1
Answer: The left side is a shortcut for 'Enter' the small wheel in the middle is used to scroll your view of the object,The right is used to intialize options pop-up to edit or initiate commands of the intended target



Related Questions

carter is the web designer for an open source project. he has created a program that facilitates the easy collation of data for a large-scale logistics firm. which of the following is true of the source code for carter's program? question 13 options: a) it is highly protected and obtained only by having a license. b) it is available only to carefully vetted contractors. c) it is less stable and platform dependent. d) it is available to the public.
Graphic design includes typefaces, page layouts, corporate logos, and product packaging. Which modern graphic designer is best known for his corporate logos, such as the innovative IBM logo?A) Paul Rand B) Piet Mondrian C) Theo Ballmer
A table has several fields related to computer data. You want the serial number (Sr. No.) field to increase by one every time you add a new record. Which data type would you use for the Sr. No. field?autonumber memo null BLOb
RAW files can be compressed without losing information t/f
Improvements in technology make the world seem larger to people.a. Trueb. False

Jenny’s needs to buy a computer to create word documents, make presentations, listen to music, and watch movies and videos. Which operating system would be appropriate for Jenny’s personal computer?

Answers

Answer:

Windows

Explanation:

The operating system that would be appropiate for Jenny's personal computer is Windows as it is easy to use, the software and programs she is going to need are easily available to install in this operating system and it allows people to interact with it through keyboard and mouse.

Answer:

the answer is c) microsoft windows

Explanation:

Which of the following devices are used for loading information into a computer? A. System unit and mouse
B. Monitor and keyboard
C. Speakers and monitor
D. Keyboard and mouse

Answers

the answer is d) keyboard and mouse

Answer:

D

Explanation:

7) Which of the following factors determines the structure, features, and functions of an information system used in a company? A) the competitive strategy B) the value of its brands C) the size of the company D) the technology used by competitors

Answers

The factor which determines the structure as well as features of an information system used throughout an organization is referred to as Competitive Strategy.

Competitive strategy

The competitive strategy of a company is concerned with how to compete in the business sectors wherein the company participates as well as operations.

In other terms, competitive strategy defines how well a company expects to develop as well as sustain a competitive edge over competitors.

Thus the above answer i.e., "option A" is correct.

Find out more information about competitive strategy here:

brainly.com/question/5042589

Answer:

The correct option is A: Competitive Strategy

Explanation:

The competitive strategy of an organization is the factor that determines the function, feature and structure of the information system that will be used. The value of its brand has nothing to do with the form of info system to be used, neither is the size of the company a determinant factor of the information system to be used. You cannot determine your own information system structure and function by that of a competitor. Hence the correct option is A. In every organization, the information system has great impact on competitive advantage in differentiation or cost.

_____ installs itself on a computer without the user’s knowledge or permission for the purpose of tracking the user’s behavior. Answer Spyware Freeware Adware Cyberware

Answers

Of the options presented for this problem, the most probable and the most likely answer to be the correct one would be the first option which is spyware.

Spyware installs itself on a computer without the user's knowledge or permission for the purpose of tracking the user's behavior. The spyware also is a software installed, sometimes it is installed erroneously since the objective would just for it to be downloaded in the computer, and tracks down all the pressed keys as an attempt to records passwords, usernames, and other important matters.

Pick a number You will write a program that will simulate the game where two players try to guess a number and the one who's closest wins.
1. Random secret number from 1 to 10 or any larger range if you want.
2. Two players will guess
3. Determine who was closest.
4. Display the results of the round in a neat and organized fashion.
5. Add some kind of style to your print outs so that your display is nice

Answers

In python 3+:

import random

secret_number = random.randint(1,10)

guess_one = int(input("Enter player one's guess: "))

guess_two = int(input("Enter player two's guess: "))

if abs(guess_one - secret_number) < abs(guess_two - secret_number):

   print(f"The secret number is {secret_number} and player 1 was closest")

elif abs(guess_one - secret_number) > abs(guess_two - secret_number):

   print(f"The secret number is {secret_number} and player 2 was closest")

else:

   print(f"The secret number is {secret_number} and it was a tie")

I hope this helps!

A(n) _______ is the most basic type of access query

Answers

Select Query
I hope this helps! :)