Robert complains that the cursor on his laptop screen often jumps around unexpectedly when he’s typing. What can he do to solve the problem?

Answers

Answer 1

Answer:

Disable the touchpad

Explanation:


Related Questions

epic poem - long narrative poem about heroic deeds about pharrell williams of the happy song please help i need the right answer

Answers

"Happy" is a song written, produced, and performed by American singer Pharrell Williams, released as the first and only single from the soundtrack album for the film Despicable Me 2 (2013). The song was first released on November 21, 2013, alongside a long-form music video. The song was reissued on December 16, 2013, by Back Lot Music under exclusive license to Columbia Records, a division of Sony Music.[1] The song also served as the lead single from Williams' second studio album, Girl (2014).

"Happy" is an uptempo soul and neo soul song on which Williams's falsetto voice has been compared to Curtis Mayfield by critics. The song has been highly successful, peaking at No. 1 in the United States, United Kingdom, Canada, Ireland, New Zealand, and 19 other countries. It was the best-selling song of 2014 in the United States with 6.45 million copies sold for the year,[3] as well as in the United Kingdom with 1.5 million copies sold for the year.[4] It reached No. 1 in the UK on a record-setting three separate occasions and became the most downloaded song of all time in the UK in September 2014;[5] it is the eighth highest-selling single of all time in the country.[6] It was nominated for an Academy Award for Best Original Song. A live rendition of the song won the Grammy Award for Best Pop Solo Performance at the 57th Annual Grammy Awards.

The music video for "Happy" was nominated for Best Male Video and Video of the Year at the 2014 MTV Video Music Awards. It also won the Grammy Award for Best Music Video at the 57th Annual Grammy Awards.[7][8] The song was Billboard's number-one single for 2014.

"Happy" was the most successful song of 2014, with 13.9 million units (sales plus equivalent streams) worldwide

Christine has a motherboard with a Socket 1156 and has called you to see if a Socket 1150 CPU could be used in its place. What would you recommend that she do?

Answers

Answer:

Hi. A tech-savvy here, the answer to the question is '' I would recommend Christine to purchase a new motherboard that has an 1150 socket in it. ''

Cheers,

user complains that his monitor is not working. You must diagnose the problem to return the monitor to normal operation. What are the four primary sources of display problems?

Answers

Answer:

The four primary sources of display problems are;

1) Monitor

2) Video Cable

3) Video driver

4) Video adapter card

Explanation:

1) Monitor

A computer monitor also known as a video display unit, VDT, or video display terminal is an output device that displays pictorial information sent from the video card

2) Video cable

The data connection cable from the monitor to the video card

3) Video driver

The program that enables the operating system work with the installed video card

4) Video adapter card

A card converts image data information into images information for display by a display output device.

What can you do to help create a safe online environment?

Answers

Answer:

by not adding a scam proof app

Explanation:

because thats life

Be mature, be careful with who you have on social media and watch for scams

Knowledge flows from the information that has been generated. Which of the following does not necessarily flow from information that has been generated: -The information can provide a better comprehension of a specific problem -Since information is based on data, and data is just the facts, the knowledge gained from the information is always correct. -The information can indicate what should be done and how it might be accomplished. -The information might suggest how one might be personally involved (BTW: this ins not a quiz/test)

Answers

Answer:

The correct option is;

Since information is based on data and data is just the facts, the knowledge gained from the information is always correct

Explanation:

In the of epistemological discipline that focuses on partial knowledge, a domain of information cannot be exhaustively understood, therefore, knowledge is said to be always partial or incomplete. Information can therefore be misleading as it can be made from a premise that is false even where the bearer of the information truly believes in the source of the data as being justified reason for the information, the bearer may not actually know the cause of the information. Knowledge gotten from information is therefore not always correct.

That, which does not necessarily flow from information that has been generated is:  Since information is based on data, and data is just the facts, the knowledge gained from the information is always correct.

What is Information?

Information refers to processed data. The knowledge that we have on matters usually stems from our processing of information or data. It is, however, wrong to conclude that all data are correct.

Information built from pieces of data can be wrong and any information processed therefrom will also be wrong. So, the above option B is not correct.

Learn more about information processing here:

https://brainly.com/question/6392847

To a traditional computer, one means
and zero means
O a. on, off
O b. up, down
O c. plus, minus
O d.right, left

Answers

a.on , off

In most computer processors, electron movement is controlled by tiny switches that turn this flow of electricity on and off...zero represents off and one represents on

Which argument forces a writer to return to and change the input before resolving a “UnicodeError”?

errors= “strict”
errors= “fix”
errors= “ignore”
errors= “replace”

Answers

errors= “fix” argument forces a writer to return to and change the input before resolving a “UnicodeError”.

What is Unicode Error?

Python uses the Unicode standard to represent characters in code point format. These standards were created to prevent character ambiguity, which could lead to Unicode problems.

To eliminate such uncertainty, we employ Unicode standards. It is also possible to consider the capital "i" as two distinct characters with two separate meanings.

Python supports two different forms of Unicode errors: Unicode encodes errors and Unicode decodes errors. It incorporates the idea of Unicode error handlers in Python.

Therefore, errors= “fix” argument forces a writer to return to and change the input before resolving a “UnicodeError”.

To learn more about Unicode, refer to the link:

https://brainly.com/question/17147612

#SPJ3

Which Additional Authorization List item can replace the hook at the end of the winch cable for fastening the cable to some loads?

Answers

Answer:

Shackle

Explanation:

A winch may be defined as a mechanical device which is used to pull in or let out the rope or cable maintaining its tension. It can also adjust the tension of the cable or the rope.

It is mainly used in tow trucks, elevators and steam shovels.

Shackle is one of the additional authorization list of a vehicle with a winch which can be used to replace the hook of the cable of the winch.

Your hometown probably has little to offer in terms of photography because you've already seen it. True False

Answers

False it the answer bro

Answer:

Your answer would be (B) False

Explanation:

I hope this helps

Which of the following are benefits of using
technology? (Select three answers)

-hackers
-better accuracy
-electricity
-access to the global market
-higher product prices
-productivity

Answers

The sixth one , the fourth and the second

WILL GIVE BRAINLIEST!!!!!!!!!
What problems can occur on my computer if I don't clear Cache

Answers

Answer:

Nothing major will happen

Explanation:

Cache is used by the CPU.  It  reduces the time needed to  access the data from the main memory.  Cache memory is faster and smaller, it  is located near the processor core and stores copies of data frequently used by the main memory.  If you do not clear the cache memory it will make everything slowerHowever if you do not clear the cache memory it will not have any major  effect on your computer Cache memory is everywhere from operating systems to phone apps and browsers.  CPUs depend on the cache to to do all the calculations, CPU require data stored in cache memory to do faster calculations. Cache used in browsers speeds up the repeat visit visits to web pages.  Well developed applications are able to clear cache at any time and still keep functioning until cache is rebuilt, but sometimes the data stored on Browser cache can cause login issues so we should clear the browser cache to prevent it.

Which of the following activities poses the greatest personal cybersecurity risk? A. Making a purchase on an online store that uses public key encryption to transmit information B. Paying a bill using a secure online electronic payment system C. Purchasing a couch by emailing a credit card number to the couch owner D.Checking a bank account on a bank’s website that uses HTTPS for secure communication

Answers

Answer:

C

Explanation:

por

Answer:

C.Purchasing a couch by emailing a credit card number to the couch owner

Explanation:

By emailing the credit card information, that person has access to using the credit card in many different ways that are harmful. It would be best to meet up with them and scan it or pay via paypal or other money services..

Tawni made some changes to her file and wants to save the changes in a document with a different title. How can she do this?

Answers

Answer:

By using the save as tab

Explanation:

The save as option allows a user to make another different copy of the same document, or to save the document in another location within the computer system. The shortcut key to quickly access the save as option, is F12. The save as option can also be accessed by going through the following steps

1) Click the File tab

2) Click on the Save as option

3) Select a location to save the file then click save to confirm selection and save the file.

Answer:save as tab

Explanation:

Which device actively works to prevent collisions by making sure not to send data to a segment that is already busy?

Answers

Answer: Bridge

Explanation: Bridges are employed in network connections for managing data packets, when transmissions are received, the bridge network makes the decision or filter the transmitted data and makes decision on whether to forward or block the data depending on the destination address on each frame. This prevents unnecessary traffic transmission to a network segment. Bridge networks identifies the amount of traffic in each network segment, making it possible to delineate busy segment from the one's which aren't busy and thereby blocking transmission of data to the busy segment.

What's a software function?

Answers

The purpose of most software functions is to transform inputs into an output or product. However, some functions will receive control flow instead of an input.

Answer:

Software is the set of instructions data or programs used to the computer execute task,database program, web browser.

Explanation:

Computer software is all information processed by the computer system programs and data,software is a high level language.Computer system function is divide in two parts:- (1) Application software (2) system software.Application software :- this software used the computer system to the special function of computer operation.Application software is the range of that can performed with list of software.System software :- is to provide the function that require for the users software,there are many types function:- operating system, utilities, drivers.Operating system :- this software manage to the resource and provide common service that operating system .Utilities :- these software function provide by the computer programs designed and maintain the computer.Drivers :- computer is need to the one input device and one output device to the driver system software.software that extend to the function of the another software be used in the software function .

What are pixels that are the exact same between multiple frames called?

Answers

Answer:

the answer is temporal redundancy

Explanation:

Computer Definition. Pixels in two video frames that have the same values in the same location. Exploiting temporal redundancy is one of the primary techniques in video compression (see interframe coding). Contrast with spatial redundancy.

Pixels that are the exact same between multiple frames are called: temporal redundancy.

A digital image can be defined as a type of image that comprises a matrix of pixels and is typically stored in binary form.

In digital imaging, pixel can be defined as the smallest (minute) are of illumination on an output device through which an image is  formed. Thus, a pixel is a small or minute dot that a digital image is composed of.

A frame can be defined illustration or presentation of all of the multiple visual elements in an image.

A temporal redundancy is also referred to as exploiting interframe coding and it can be defined as pixels that are the exact same between multiple frames.

For instance, when there are pixels in two (2) frames that are having exactly the same values in the same location, this is usually described as temporal redundancy.

Read more: https://brainly.com/question/12972964

Which function key opens a dialog box that allows you to make a special selection of, for example, all cells containing comments, or all cells containing formulas, or all objects (text boxes, shapes, etc.) on a worksheet

Answers

Answer:

F5 key.

Explanation:

In Computer science, F5 is a function key which opens a dialog box that allows you to make a special selection of, for example, all cells containing comments, or all cells containing formulas, or all objects (text boxes, shapes, etc.) on an excel worksheet.

In Microsoft Excel, the F5 key is known as a "Go to special function" which avails users the ability to select all cells that meets certain defined criteria, such as the cells containing comments, formulas, objects, constants etc.

A metaphor of human-computer interaction (HCI) in which interacting with the computer, is much like carrying on a conversation is called a _______ metaphor.

Answers

The answer is
Dialog metaphor.

When troubleshooting a desktop motherboard, you discover the network port no longer works. What is the best and least expensive solution to this problem?

Answers

Answer: You could look up tutorials on how to fix it your self or take it somewhere to get it fixed for cheap.

Explanation:

Answer:

Update the motherboard drivers.

Explanation:

A step commonly used for Internet vulnerability assessment includes __________, which occurs when the penetration test engine is unleashed at the scheduled time using the planned target list and test selection.

Answers

Complete Question:

A step commonly used for Internet vulnerability assessment includes __________, which occurs when the penetration test engine is unleashed at the scheduled time using the planned target list and test selection.

Group of answer choices

A. scanning

B. subrogation

C. delegation

D. targeting

Answer:

A. Scanning.

Explanation:

A step commonly used for Internet vulnerability assessment includes scanning, which occurs when the penetration test engine is unleashed at the scheduled time using the planned target list and test selection.

Internet vulnerability assessment can be defined as the process of defining, analyzing, measuring, identifying, classification and prioritization of vulnerabilities in network resources used to access the internet. The main purpose of an internet vulnerability assessment is to provide necessary informations or data about the threats being posed to an individual or organization through the use of a scanning program or system such as a network security scanner

A key principle of human-computer interaction (HCI), that states that the appearance of any control should suggest its functionality, is called

Answers

Answer:

"Affordance" is the correct answer.

Explanation:

The performance or properties of such an entity that determines its possible applications which makes it abundantly clear how everything could and should always be used people are sitting or standing on something like a chair as it is very apparent.Users are allowed to experience conceptions without thinking about how to make use of other objects.

A video conferencing application isn't working due to a Domain Name System (DNS) port error. Which record requires modification to fix the issue?

Answers

Answer:

Service record (SRV)

Explanation:

Service records (SRV record) are data records stipulating specifications of the DNS such as the port numbers, servers, hostname, priority and weight, and IP addresses of defined or cataloged services servers.

The SRV record is the source of information and the search site about the

location of particular services as such an application i need of such services will look for a related SRV record

A configured SRV is the source of the ports and personal settings for a new email client, without which the parameters set in the email client will be incorrect.

You are a cleared employee. You discovered fraud and waste of money related to a classified program within your agency. If you report this fraud and waste through appropriate channels, you may receive protection under the Presidential Policy Directive 19 (PPD-19), Protecting Whistleblowers with Access to Classified Information.A. TrueB. False

Answers

Answer:

A. True.

Explanation:

If you are a cleared employee, who discovered fraud and waste of money related to a classified program within your agency. When you report this fraud and waste through appropriate channels, you may receive protection under the Presidential Policy Directive 19 (PPD-19): Protecting Whistleblowers with Access to Classified Information.

In the United States of America, President Barack Obama signed the Presidential Policy Directive 19 (PPD-19) in 2012. The PPD-19 is an executive order designed to provide significant protection for an employee who have access to classified informations such as waste of money and frauds, as well as prohibiting any form of retaliation against this cleared employee.

Trish has bought a new computer that she plans to start working on after a week. Since Trish has not used computers in the past, she has asked her friends to suggest any preventive measures that she can take to avoid hardware failures. Which of the following suggestions should her friends give her?

Answers

Hello, I am charlespierce576! I believe I might have the answer! Simple policies such as turning of off devices not in use. Also unplugging devices during a storm.

Write an algorithm that outlines how to calculate the room area for the image below.

Answers

Answer:

The following are the algorithm to this question:

Explanation:

Following are the steps of the algorithm:

step 1:

To calculate the area of the room, firstly we need to divide the given image into parts and calculate the area of the given image.

step 2:

After calculating each part area, we merge all the parts to calculate the areas.

Calculating area of the parts:

In part 1:

It forms the square shape, and the formula of the square is [tex]side \times side[/tex].   In this diagram we let A=B. that's why the area is [tex]b^2[/tex].

In part 2:

In this part also forms the square image.  In this, the side is equal to (A-c). so, the area is equal to [tex](A-C)^2[/tex].

In part 3:

It forms the triangle shape, and the area of the triangle is[tex]= \frac{b \times h}{2}[/tex]. the value of "b" is E and the "h" is = (A-C). so, the area is [tex]= \frac{E\times (A-C)}{2}[/tex].  

The total area is:

[tex]\bold{ =b^2+(A-C)^2+ \frac{E\times (A-C)}{2}}[/tex]

The algorithm that outlines how to calculate the room area is as follows:

StartInput A, B, C, D, EAreaRectangle1 = A x BAreaRectangle2 = (A - C) x (D - C - E)AreaTriangle1 = 0.5 x E x (A -C)Total = AreaRectangle1 + AreaRectangle2 + AreaTriangle1Print TotalStop

From the attached figure, we can see that the figure has been split to 3

A rectangle with the dimension; A by BA rectangle with the dimension: (A - C) by (D - C - E)A triangle with the dimension base E and height (A - C).

So, the algorithm is as follows:

Start ---- > This begins the algorithmInput A, B, C, D, E ---- > This gets input for the sides of the shapeAreaRectangle1 = A x B ----> This calculates the area of the first rectangleAreaRectangle2 = (A - C) x (D - C - E) ----> This calculates the area of the second rectangleAreaTriangle1 = 0.5 x E x (A -C) ---> This calculates the area of the triangleTotal = AreaRectangle1 + AreaRectangle2 + AreaTriangle1 -----> This adds up the 3 areas to get the total area of the shapePrint Total ----> This prints the calculated areaStop -----> This ends the algorithm

Read more about algorithms at:

https://brainly.com/question/17780739

Imagine that a crime has been committed and being a police officer you have to investigate the case. Solving a crime can be a very complex problem as there are many things to consider. How will you decompose this problem?

Answers

Explanation:

On October 31, around twelve o'clock at night, the lights were dull. It was Siberian cold and I was walking painfully under the whitish lighting of a lamppost and the retro neon lights of a convenience store in a neighborhood that was buzzing when I went to buy meat. buildings, grayish in this half-light, crumbled under the weight of sleep, while the neighborhood was still open. Its decoration was particularly macabre in tone: synthetic but very sticky spider webs adorned the porches of the terraces, pumpkin ornaments are exhibited like works of art, ... Some pushed the macabre by hanging mannequins made up in corpses. At the entrance to the neighborhood, I found the body of its owner stabbed. Frozen in place, I wondered what else awaits me. My heart was pounding, feeling a shiver of anguish. When I was removing the phone from my pocket to call my police friends, my hands were clenched in fear. An investigation was carried out to find out the causes of death. Also, I went with them so they take my words. Hopefully the murderer will be arrested to put an end to this sybilinous crime.

Click to review the online content. Then answer the question(s) below, using complete sentences. Scroll down to view additional
questions.
Online Content: Site 1
What was one important academic skill the blogger learned?
9) XO3-
BIUS X, x®

Answers

Answer:

It says in the article.

Explanation:

"Taking tests was really hard for me. I would get really nervous before tests. Mr. Davidson, my math teacher, taught me that if I prepared well, there was no reason for me to feel anxious over tests. He showed me how reviewing my notes every night would help me remember what was taught in class. This daily review reduced the amount of time I had to spend preparing for big tests. "

Answer:

 One important academic skill the blogger learned . I struggled in my first year. Many times I failed assignments because I missed due dates, and I did poorly on quizzes and tests because I could not understand my own notes. I was frustrated and about to give up, but then I met Mr. Lee. He sat me down and asked me to describe how I did homework. He quickly identified the issue: I was not organized. He told me to write down every assignment, big or small, on a calendar. He also showed me how to make to-do lists and organize my notes. Every afternoon, he would look at my notes and suggest how to improve my note-taking skills. Not long after that, my grades started improving.

Explanation:

I got it correct on edg

What will the following loop display? 0 1 2 3 4 5 0 1 2 3 4 0 1 2 3 4 The loop will display numbers starting at 0, for infinity.

Answers

Answer:

muestra números que comienzan en 0

Explanation:

Context-based signatures match a pattern of activity based on the other activity around it, such as a port scan. true and false

Answers

Answer:

The given statement is "True".

Explanation:

Context-based signatures become wired networks on either the incoming packet's information. Documentation included within the IP headers has been used to stimulate a certificate or stamp based on the scenario. The whole category of signatures examines congestion and how much it appears to fit through the other pedestrians which mostly surrounds it.

So that the above is the true answer.

QUESTION 56 Use the Windows ________ to check on a nonresponsive program. Backup utility Error-checking System Restore Task Manager

Answers

Answer: Task manager

Explanation: The task manager window represents an interface in personal computers manufactures by Microsoft. The task manager window contains several information about a computers current processes usually displayed in graphical manner, in addition it provides information on the current running processes and application, the uptime of the computer, the graphic processor. With the task manager window users can set process priorities and prioritize applications, by affording users to view process and their corresponding load on the CPU, users can terminate or close applications from within the task manager interface. Hence non-responsuve programs can be viewed and terminated.

Other Questions
true or false. if you are fanatical about something, you are obsessed with it. What is 35 is 60% of what number? Select the correct answer.What was William Shakespeare's initial motive for becoming an actA.He wanted to provide money for his family.B. He wanted to be famous.O c.He wanted to elevate his status in society.D.He wanted to fulfill his parents' wishes. Solve the equation (If possible please show work) Although debt financing is usually the cheapest component of capital, it cannot be used in excess because I need titration curve of sebacic acid What led to the diffusion of agricultural techniques from the Sahel region to other parts of Africa around 2000 BCE? someone solve this ? The early morning is a busy time for the school principal An estimate of an asset's value to the company, calculated by discounting the future cash flows from the investment at the project's required rate of return and then subtracting the initial amount of the investment, is known as: which two quantities are used to predict gravitational force according to newton's law of universal gravitation When the activity of a person's central nervoussystem is reduced, the brain ...A. slows down.B. compensates.C. speeds up. Classify each of the ofllowing as either a policy instrument or an intermediate target, and explain why?a. The ten-year Treasury bond rateb. The monetary base c. Ml d. The fed funds rate Find the values for k so that the intersection of x=2k and 3x+2y=12 lies in the first quadrant. Tegan needs to make 686868 more snow blocks to finish building an igloo. Write an equation for the number of blocks Tegan still needs to make, mmm, when she has completed ccc blocks. Tegan completes 333333 blocks. How many blocks does Tegan still need to make to finish the igloo? Mia has an outside basis of $50,000 in the Brimstone Partnership, including her share of liabilities of $25,000. In a liquidating distribution, she receives cash of $10,000 and inventory worth $8,000 (inside basis to Brimstone of $20,000). What is Mia's recognized gain or loss on the liquidation and basis in the property received i need help on this.. A piece wide function f(x) is defined as shown f(x) = { -5/4x + 90, 0 < x < 40 { -3/8x + 75, 40 < x < 200 which table could be used to graph a piece of the function? HELP Which production by England's Punchdrunk company was a breakout hit of the 2011-12 season in New York and is considered the leading example of the new genre: immersive theatre? How did the publics perception towards vaccination during the polio epidemic differ from now? Why?