While your hands are on home row, both of your thumbs are on _____. the space bar the return key the mouse B and N

Answers

Answer 1
Answer: The space bar is where your thumbs are
Answer 2
Answer:

Answer:

the space bar

Explanation:


Related Questions

Part BIdentify the storage formats of audio and video files. How do they differ from each other?
What does the Bookmark/Favorites feature of a Web browser do?
A computerized spreadsheet program is useful fora. preparing telephone surveys. b. keeping information confidential. c. sorting and charting data from surveys. d. conducting primary research.
HELP FAST PLZZZ. Madison loves to play multi-user games with very realistic graphics. How much RAM should she have in her laptop??Group of answer choices6 GB8 GB16 GB4 GB
The major advantage of ________ is its simplicity and its freedom from assumptions about the expected input to any program, service, or function.

Which type of network treats all processors equally, and allows peripheral devices to be shared without going to a separate server?

Answers

The correct answer is P2P or peer-to-peer servers.

Hope I helped ;)

If you want to go directly to a specific web page using a URL, where should you type the URL in Firefox?a. In an e-mail
b. In a Google account
c. In the address bar
d. In the username field

Answers

If you want to go directly to a specific web page using a URL, you should type the URL in the address bar of the Firefox. That is option C.

What is an address bar?

An address bar in a computer is the text field at the top of a web browser's graphical user interface that shows the name of a current page.

The Uniform Resource Locator ( URL) is a unique identifier used to locate a resource on the Internet.

Therefore, If you want to go directly to a specific web page using a URL, you should type the URL in the address bar of the Firefox.

Learn more about web page here:

brainly.com/question/1382377

Usually when looking up something, you'd type your question, or statement in the address bar which will link you too the page you want. In this case your answer would be "C".

What is the least effective way to create balance and flow in your life?

Answers

Act on your emotions in the moment instead of thinking about them.

Name the hardware component that performs each of the following functions (1) performs calculation and/or comparisons (2) holds the data and programs that are currently being used by the central processing unit (3) contains instructions that are used during booting up of the computer

Answers

The name of the hardware components of a computer system based on their functions are:

  1. The central processing unit (CPU): performs calculation and/or comparisons.
  2. Random access memory (RAM): it holds the data and programs that are currently being used by the central processing unit (CPU).
  3. Read only memory (ROM): it contains instructions that are used during booting up of the computer.

What is a hardware?

A hardware can be defined as a physical component of an information technology (IT) or computer system that can be seen and touched.

The hardware components of a computer.

Some examples of the hardware components of a computer system and these include:

  • Motherboard
  • Central processing unit (CPU)
  • Keyboard
  • Monitor
  • Mouse
  • Random access memory (RAM).
  • Read only memory (ROM).

In Computer technology, the name of the hardware components of a computer system based on their functions are:

  1. The central processing unit (CPU): performs calculation and/or comparisons.
  2. Random access memory (RAM): it holds the data and programs that are currently being used by the central processing unit (CPU).
  3. Read only memory (ROM): it contains instructions that are used during booting up of the computer.

Read more on hardware here: brainly.com/question/959479

At your job, you often have to address letters to the customer support manager, Tyson Kajewski. The problem is that you are constantly misspelling her last name Kajewksy. Which of the following Word features would probably be the easiest way to handle this problem?

Answers

Input his name in the dictionary function, you can also copy the given name an paste as much as you need

when a cloud customer uploads personally identifiable information (pii) to a cloud provider, who is ultimately responsible for the security of that pii?

Answers

When a cloud customer uploads personally identifiable information (PII) to a cloud provider, both the customer and the cloud provider share responsibility for the security of that PII.

The specific division of responsibilities will depend on the terms of the service level agreement (SLA) between the customer and the cloud provider. In general, the cloud provider is responsible for securing the infrastructure and services that are used to store and process the PII. This includes ensuring that appropriate security controls are in place, such as access controls, encryption, and monitoring. The cloud provider may also be responsible for notifying the customer in the event of a security breach or incident.

However, the cloud customer also has a responsibility to ensure that the PII they upload to the cloud is secure. This includes properly securing their own systems and networks that are used to upload and access the PII, as well as properly configuring any security controls provided by the cloud provider.

Ultimately, the responsibility for the security of PII in the cloud is shared between the customer and the cloud provider, and both parties must take appropriate measures to ensure the security of the data.

To know more about personally identifiable information (PII), visit:

brainly.com/question/30023988

#SPJ11

When a cloud customer uploads personally identifiable information (PII) to a cloud provider, both the customer and the cloud provider share responsibility for the security of that PII.

The specific division of responsibilities will depend on the terms of the service level agreement (SLA) between the customer and the cloud provider. In general, the cloud provider is responsible for securing the infrastructure and services that are used to store and process the PII. This includes ensuring that appropriate security controls are in place, such as access controls, encryption, and monitoring. The cloud provider may also be responsible for notifying the customer in the event of a security breach or incident.

However, the cloud customer also has a responsibility to ensure that the PII they upload to the cloud is secure. This includes properly securing their own systems and networks that are used to upload and access the PII, as well as properly configuring any security controls provided by the cloud provider.

Ultimately, the responsibility for the security of PII in the cloud is shared between the customer and the cloud provider, and both parties must take appropriate measures to ensure the security of the data.

To know more about personally identifiable information (PII), visit:

brainly.com/question/30023988

#SPJ11