Mouse and keyboard events are both known as ____ events.

A. peripheral
B. static
C. user
D. alternate

Answer: C

Computer Science & Information Technology

You might also like to view...

The set of rules that Access follows when evaluating expressions in calculated fields is called ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

The three cornerstones of voice network system security are availability,

a. circumvention, and confidentiality. b. circumvention, and disclosure. c. confidentiality, and integrity. d. disclosure, and integrity.

Computer Science & Information Technology