To access properties of an object, the mouse technique to use is–
(A) dragging
(B) dropping
(C) right-clicking
(D) shift-clicking
(E) None of these

1 Answer

Answer :

right-clicking

Related questions

Description : To access properties of an object, the mouse technique to use is: a) Dragging b) Dropping c) Right - Clicking d) Shift - Clicking e) None of The Above

Last Answer : c) Right - Clicking

Description : How does one disable right clicking or prevent dragging image to desktop on Tumblr?

Last Answer : answer:You can capture right-click actions with javascript, but visitors can disable javascript when viewing your page. You can hide an image behind a transparent image to make it harder to drag an image, but ... is sending a copy of the image back and the user of the browser can get the image.

Description : Why does my keyboard's mouse keep dragging things and highlighting them blue on its own?

Last Answer : Something inside has failed. Time for a new mouse.

Description : When I forget to put the computer (iMac OS X 10.7.4) to sleep and return several hours later, why does dragging the mouse generate grey pixilated lines on the screen?

Last Answer : Have you looked to see what power settings you have—i.e., what default behavior is in place for the computer’s behavior when it has been idle for some specified amount of time?

Description : Press and hold ……………….. of mouse while dragging for drawing a shape. -Technology

Last Answer : Press and holdleft buttonof mouse while dragging for drawing a shape.

Description : The x.25 standard specifies a a. technique for start-stop data b. technique for dial access c. DTE/DCE interface d. data bit rate e. none of above

Last Answer : DTE/DCE interface

Description : Satellite-Switched Time-Division Multiple Access (SS/TDMA) is A. the method of determining whichdevice has access tothe transmission medium at any time. B. a medium access control technique for ... switching is used to dynamically changethechannel assignments D. All of theabove E. None of the above

Last Answer : a form of TDMA in which circuit switching is used to dynamically changethechannel assignments

Description : How can I get my mouse to stop clicking once and going straight to the program?

Last Answer : Describe the mousepad in a bit more detail, please. My MacBook Pro pad, for instance, is one big, multitouch button.

Description : Which of the following comments about object oriented design of software, is not true ? Objects inherit the properties of class Classes are defined based on the attributes of objects an object can belong to two classes classes are always different

Last Answer : an object can belong to two classes

Description : Did you know that you can access medical supplies on Amazon by clicking Industrial and Scientific category?

Last Answer : Yes I knew medical supplies were accessible on Amazon, but were limited to usage within the United States, unlike other products on Amazon where it can be shipped to other countries. Medical ... Sales and distribution of drugs requires licensing to control the abuse and track usage of most drugs.

Description : What role does individualism and dislike of government interference play for dragging the United States to the bottom in terms of life expectancy over the past 30 years?

Last Answer : Look at the obesity levels and the violence in the US. Two really big factors.

Description : What are your thoughts on the stuff going on in Tennessee and the mosque that is built, but won't be open for Ramadan because they are dragging their feet on the building inspection?

Last Answer : Since I don’t go to the mosque, I am indifferent. Hope they get it all figured out.

Description : Is it okay to skim through boring/dragging parts of a book?

Last Answer : It is alright to skim.It is also alright to rip the tag off a mattress.:)

Description : Which of the following canbe used to select the entire document ? (A) CTRL+A (B) ALT+F5 (C) SHIFT+A (D) CTRL+K (E) CTRL+H

Last Answer : CTRL+A

Description : In _______ methods, the stations consult one another tofind which station has the right to send. A) random access B) controlledaccess C) channelization D) none of the above

Last Answer : controlledaccess

Description : The Caesar cipher is a _______cipher that has a key of 3. A. transposition B. killer C. shift D. none of the above

Last Answer : C. shift

Description : Which most popular input device is used today for interactive processing and for the one line entry of data for batch processing? a. Mouse b. Magnetic disk c. Visual display terminal d. Card punch

Last Answer : Mouse

Description : Which is considered a direct entry input device? a. Optical scanner b. Mouse and digitizer c. Light pen d. All of the above

Last Answer : All of the above

Description : Which is considered a direct entry input device? a. Optical scanner b. Mouse and digitizer c. Light pen d. All of the above

Last Answer : All of the above

Description : Which input devicecannot be used to work in MSOffice? A. Scanner B. Light Pen C. Mouse D. Joy Stick

Last Answer : Joy Stick

Description : Is "clicking" the right term?

Last Answer : answer:Touching, tapping or pushing are the ones I hear most often. I think Apple use tapping over other verbs of that nature, but definitely not clicking (there's no clicky noise except when you ... feel like you have done something very, seriously wrong and you must be punished with angry noises.

Description : Hi, I have a question. Yesterday, when reversing on an unpaved road, I ran into an unevenness and a bang sounded. Since then, at speeds of about 40 km / h, there was a barely audible click from ... only heard when the window was open. Would anyone know what it could be? Or if it could be serious?

Last Answer : There can be many causes. He wants to look at it. Visit a mechanic or service and see.

Description : What is done firstly, to create a compressed and archive file into uncompressed ? a) Left clicking a file -> Open with archive manager b) Right clicking a file -> open with archive manager c) Left clicking a file -> open with Winzip d) Right clicking a file -> open with winzip

Last Answer : b) Right clicking a file -> open with archive manager

Description : Which of the following technique isused for encapsulation? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets. B. a technique used by protocols in which a lower level ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : a technique used by protocols in which a lower level protocol accepts a message from ahigher level protocol and places it in the data portion of the low level frame

Description : Which of the following technique isused for fragment? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets B. a technique used by protocols in which a lower level protocol ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : one of the pieces that results when an IP gateway divides an IP datagram into smallerpieces for transmission acrossa network that cannothandle the originaldatagram size

Description : The modulation technique used by GSM cellular system A. Phase shift keying B. Frequency shift keying C. Gaussian minimum shift keying D. QAM

Last Answer : C. Gaussian minimum shift keying

Description : White box testing, a software testing technique is sometimes called ? Basic path Graph Testing Dataflow Glass box testing

Last Answer : Glass box testing

Description : White box testing, a software testing technique is sometimes called ? Basic path Graph Testing Dataflow Glass box testing

Last Answer : Glass box testing

Description : Inan HFC network, the upstream data are modulated using the _______ modulation technique. A) QAM B) QPSK C) PCM D) ASK

Last Answer : QPSK

Description : Inan HFC network, the downstream data are modulated using the _______ modulation technique. A) PSK B) QAM C) PCM D) ASK

Last Answer : QAM

Description : DMT is a modulation technique that combineselements of _______ and _______. A) FDM; TDM B) QDM; QAM C) FDM; QAM D) PSK; FSK

Last Answer : FDM; QAM

Description : The ______ technique expands the bandwidthof a signal by replacing each data bit with n bits. A) FDM B) DSSS C) FHSS D) TDM

Last Answer : DSSS

Description : The _______ technique uses M different carrier frequencies that are modulated by the source signal. At one moment, the sign modulates one carrier frequency; at the next moment, thesignal modulates another carrier frequency. A) FDM B) DSSS C) FHSS D) TDM

Last Answer : FHSS

Description : _____ isa digital multiplexing technique for combiningseveral low-ratechannels into onehigh-rate one. A) FDM B) TDM C) WDM D) None of the above

Last Answer : TDM

Description : _____ isan analog multiplexing technique to combine optical signals. A) FDM B) TDM C) WDM D) None of the above

Last Answer : WDM

Description : Which multiplexing technique involves signals composed of light beams? A) FDM B) TDM C) WDM D) none of the above

Last Answer : WDM

Description : Which multiplexing technique shifts each signal to a different carrier frequency? A) FDM B) TDM C) Both (a)and (b) D) None of the above

Last Answer : FDM

Description : Which multiplexing technique transmits digital signals? A) FDM B) TDM C) WDM D) None of the above

Last Answer : TDM

Description : Which multiplexing technique transmits analog signals? A) FDM B) TDM C) WDM D) (a) and (c)

Last Answer : (a) and (c)

Description : The most common technique to change an analog signal to digitaldata is called __________. A) PAL B) PCM C) sampling D) none of the abov

Last Answer : PCM

Description : . A technique called______ isused tocreate a subnetting effect. A) ARP B) RARP C) proxy ARP D) noneof the above

Last Answer : proxy ARP

Description : When thecomputer provides the manager with a multiple choice of possible answers, the prompting technique is A. question and answer B. form filling C. open-ended question D. menu selection E. None of the above

Last Answer : menu selection

Description : Which of the following routing technique / techniques is / are used in distributed systems ? A. Fixed Routing B. Virtual Routing C. Dynamic Routing a. A Only b. A and B only c. C only d. All A,B,C

Last Answer : a. A Only

Description : The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ a. piggybacking b. cyclic redundancy check c. fletcher’s checksum d. parity check

Last Answer : a. piggybacking

Description : . The newer technique uses a distributed database system called ………………….. to translate names to addresses. A. DNS B. IP C. ARP D. Telnet

Last Answer : A. DNS

Description : The technique in which a congested node stops receiving data from the immediate upstream node or nodes is called as _______ A. Admission policy B. Backpressure C. Forward signaling D. Backward signaling

Last Answer : B. Backpressure

Description : The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ A. piggybacking B. cyclic redundancy check C. fletcher’s checksum D. parity check

Last Answer : A. piggybacking

Description : The term Blue Shift' is used to indicate? A. Doppler effect in which an object appears bluer when it is moving towards the observer or observer is moving towards the object? B. Turning a star from white ... . In future sun would become blue D. Black hole was blue at its start E. None of these

Last Answer : A. Doppler effect in which an object appears bluer when it is moving towards the observer or observer is moving towards the object?