Mouse gestures are the mouse equivalent to ____.
A. keyboard shortcuts
B. voice recognition
C. screen readers
D. virtual keyboard
Answer: A
You might also like to view...
Identify and describe the type errors in the following code.
```
1 public class GenericStuff {
2 public static void main ( String args[] ) {
3 Pair
The ____ handles certain cases involving credit card fraud and identity theft.
A. FBI B. U.S. Secret Service C. U.S. Treasury Department D. Securities and Exchange Commission
Most users enter information into a database through the use of a ________.
A. form B. table in datasheet view C. query D. macro
Identity theft is more serious than credit card number theft
A. True, identity theft cause victims no actual damage but their personal information will be shared B. False, identity theft cause victims no damage C. True, identity theft can cause victims massive damages because the thieves are able to use the victim’s information to take out large loans D. False, credit card number theft is more serious than identity theft