My f key sticks and doesn't press down like the rest of the keys . It does type but I'm not sure why it won't press down. It?

1 Answer

Answer :

Samethinghappenswithmyspacebaroften.

Related questions

Description : When I press the apostrophe key on my computer while using Firefox it automatically goes to the 'Find' function (equivalent of CTRL + F). How do I turn that off?

Last Answer : answer:When typing in a text box, it's going to not bring up the find function , however when not in a text box, hitting certain keys bring up the find function. This is, I think (based on ... does this (as well as turn it off entirely): http://nic-nac-project.de/~kaosmos/index-en.html#searchkey

Description : In MS-Excel, which of the following keys helps you to selects all cells below the current selection, up to the edge of the current data region: a) Ctrl + Shift + Down Arrow Key b) Ctrl + Shift + Right Arrow Key c) Ctrl + Shift + D d) None of These

Last Answer : a) Ctrl + Shift + Down Arrow Key

Description : In MS-EXCEL, for Moves the current selected range down a row, you will press: a) Shift + Up Arrow Key b) Shift + Down Arrow Key c) Ctrl + Down Arrow Key d) None of These

Last Answer : b) Shift + Down Arrow Key

Description : In MS-EXCEL, for Moves the current selected range down a row, you will press: a) Shift + Up Arrow Key b) Shift + Down Arrow Key c) Ctrl + Down Arrow Key d) None of These

Last Answer : b) Shift + Down Arrow Key

Description : Say I'm the tech guy at your company... Is it wrong to tape upside down tacks to all the caps lock keys in the building?

Last Answer : Yes, it is wrong. Instead, you should use a miniature version of the Canadarm that is programmed to slap the typists hands every time they use all caps inappropriately. ;o)

Description : Based on the cardinality ratio and participation ............... associated with a relationship type, choose either the Foreign Key Design, the Cross Referencing Design or Mutual Referencing Design. (A) Entity (B) Constraints (C) Rules (D) Keys

Last Answer : (B) Constraints

Description : You want to send a valuable object to a friend. You have a box which is more than large enough to contain the object. You have several locks with keys. The box has a locking ring which is more than ... do it? Note that you cannot send a key in an unlocked box, since it might be copied. -Riddles

Last Answer : Attach a lock to the ring. Send it to her. She attaches her own lock and sends it back. You remove your lock and send it back to her. She removes her lock.

Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These

Last Answer : a) Encryption

Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These

Last Answer : a) Encryption

Description : While mixing sand, gravel, and cement for the foundation of a house, a worker noticed a small bird hopping along the top of the foundation wall. The bird misjudged a hop and fell down one of the holes ... . What would be the easiest way to get the bird out of the hole without injuring it? -Riddles

Last Answer : Since they had plenty of sand available, they could pour a little at a time into the hole. The bird would constantly keep shifting its position so that it stood on the rising sand.

Description : If a laptop keyboard key lifts up and is ruined to where it won't snap down any longer, replace just the one key or is there a kit of some sort for the whole board?

Last Answer : answer:You can get a wired keyboard for $10 or less these days. If the plastic connector beneath the key is damaged I suppose you could look for replacement parts.. but.. all said and done.. it would probably be cheapest and easiest to just get another keyboard.

Description : You and nine other individuals have been captured by super intelligent alien overlords. The aliens think humans look quite tasty, but their civilization forbids eating highly logical and cooperative beings. ... , each of you must guess the color of your hat starting with the perso -Riddles

Last Answer : Let's see how it would play out if the hats were distributed like this. The tallest captive sees three black hats in front of him, so he says 'black,' telling everyone else he sees an odd ... go. It looks like these aliens will have to go hungry, or find some less logical organisms to abduct.

Description : Does a homeowner's association have master keys or a master key to all the houses or condos?

Last Answer : I have never heard of a HOA having that kind of access. I am sure they don’t have keys.

Description : I've just lost the keys to my 2006 Honda Accord (both the key I normally use and my spare key). Now what?

Last Answer : Call the dealer. Your key-code is associated with your VIN, and they will cut and program you a new one. It ain’t cheap.

Description : Is there a function key or series of keys that will insert the current date and time?

Last Answer : Geesh, I’m sorry I missed it!

Description : Suppose you want to send in the mail a valuable object to a friend. You have a box which is big enough to hold the object. The box has a locking ring which is large enough to have a lock attached ... you send the valuable object, locked, to your friend - so it may be opened by your friend? -Riddles

Last Answer : Send the box with a lock attached and locked. Your friend attaches his or her own lock and sends the box back to you. You remove your lock and send it back to your friend. Your friend may then remove the lock she or he put on and open the box.

Description : Suppose you want to send in the mail a valuable object to a friend. You have a box which is big enough to hold the object. The box has a locking ring which is large enough to have a lock attached ... you send the valuable object, locked, to your friend - so it may be opened by your friend? -Riddles

Last Answer : Send the box with a lock attached and locked. Your friend attaches his or her own lock and sends the box back to you. You remove your lock and send it back to your friend. Your friend may then remove the lock she or he put on and open the box.

Description : What is the utility of primary key in database? Write distinct features of primary keys. -Technology

Last Answer : The primary key is used to uniquely identify the record in a database. It can be a column or a set of columns in the table.Main features of the primary key are as follows:1. It must contain a unique value for each record of the table.2. It does not contain null values.

Description : How many control keys are there on the key board ?

Last Answer : Usually there are 2 o'clock. In some cases it is 1 o'clock.

Description : key - on board How many function keys ?

Last Answer : Key - on board Function Key 12

Description : Describe how to retrieve the ASCII key code from a keystroke. How would you retrieve key combinations for non-ASCII keys?

Last Answer : Keystrokes can be intercepted by handling the KeyPress and KeyDown events. Both of these events relay information to their handling methods in the form of their EventArgs. The KeyPressEventArgs, ... you would handle the KeyDown event and use the properties exposed by the KeyEventArgs instance.

Description : ________located on the right corner of the keyboard, is a separate set of number keys for quick input of numbers: a) Numeric Keypad b) Arrow Pad c) Symbolic Key Pad d) None of These

Last Answer : a) Numeric Keypad

Description : Which of the following keys of personal computer is not available in the key board of traditional typewriters? (1) Tab (2) Spacebar (3) Enter (4) Backspace

Last Answer : (3) Enter

Description : _________ and _________ saves the publish and subscribe keys that we have generated with the PubNub Admin portal. a) public_key and subscribe_key b) Public-key and subscribe-key c) publickey and subscribekey d) Key_public and key_subscribe

Last Answer : a) public_key and subscribe_key

Description : By clicking which key the PubNub will display public, subscribe, and secret keys. a) Pane b) Demo Keyset c) Portal d) Network

Last Answer : b) Demo Keyset

Description : What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software

Last Answer : b. Public key encryption

Description : Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _____ key, while the key used to ... the _____ key. a. encryption, decryption b. private, public c. encryption, public d. public, private

Last Answer : d. public, private

Description : In cheque payment protocol, the purchase order form is signed by purchaser using a. his public key b. his private key c. his private key using his signature hardware d. various public keys

Last Answer : c. his private key using his signature hardware  

Description : The responsibility of a certification authority for digital signature is to authenticate the a. hash function used b. private keys of subscribers c. public keys of subscribers d. key used in DES 

Last Answer : c. public keys of subscribers  

Description : Public key system is useful because a. it uses two keys. b. there is no key distribution problem as public key can be kept in a commonly accessible database. c. private key can be kept secret. d. it is a symmetric key system. 

Last Answer : b. there is no key distribution problem as public key can be kept in a commonly accessible database.  

Description : Public key encryption method is a system a. which uses a set of public keys one for each participant in e-Commerce b. in which each person who wants to communicate has two keys; a private key known to him ... him. c. which uses the RSA coding system. d. which is a standard for use in e-Commerce.  

Last Answer : b. in which each person who wants to communicate has two keys; a private key known to him only and a public key which is publicized to enable others to send message to him.

Description : Triple DES a. is a symmetric key encryption method b. guarantees excellent security c. is implementable as a hardware VLSI chip d. is public key encryption method with three keys. 

Last Answer : b. guarantees excellent security  

Description : DES works by using a. permutation and substitution on 64 bit blocks of plain text b. only permutations on blocks of 128 bits c. exclusive ORing key bits with 64 bit blocks d. 4 rounds of substitution on 64 bit blocks with 56 bit keys

Last Answer : a. permutation and substitution on 64 bit blocks of plain text 

Description : By symmetric key encryption we mean a. one private key is used for both encryption and decryption b. private and public key used are symmetric c. only public keys are used for encryption d. only symmetric key is used for encryption

Last Answer : D

Description : A key-board has at least: (A) 91 keys (B) 101 keys (C) 111 keys (D) 121 keys

Last Answer : (B) 101 keys

Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.

Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.

Description : If h is chosen from a universal collection of hash functions and is used to hash n keys into a table of size m, where n ≤ m, the expected number of collisions involving a particular key K is (A) less than 1 (B) less than lg n (C) greater than 1 (D) greater than lg n

Last Answer : (A) less than 1

Description : Which of the following statements is FALSE about weak entity set ? (A) Weak entities can be deleted automatically when their strong entity is deleted. (B) Weak entity set avoids the data ... weak entity set are not partitioned according to their relationship with tuples in a strong entity set.

Last Answer : (D) Tuples in a weak entity set are not partitioned according to their relationship with tuples in a strong entity set.

Description : If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then number of secret keys required will be: (A) N (B) (N-1) (C) N(N-1)/2 (D) N(N+1)/2

Last Answer : (C) N(N-1)/2 

Description : Consider the following database table having A, B, C and D as its four attributes and four possible candidate keys (I, II, III and IV) for this table: I: {B} II: {B, C} III: {A, D} IV: {C, D} If ... the database table? (A) I and III only (B) III and IV only (C) II only (D) I only

Last Answer : (C) II only

Description : If h is chosen from a universal collection of hash functions and is used to hash n keys into a table of size m, where n≤m, the expected number of collisions involving a particular key x is less than ................... (1) 1 (2) 1/n (3) 1/m (4) n/m

Last Answer : Answer: 1

Description : Which of the following statement is true? (1) A Primary key is also a candidate key (2) Each relation has at least one foreign key (3) Foreign keys can’t have null values (4) A Primary key is also an alternate key

Last Answer : Foreign keys can’t have null values

Description : Dynamite is a tool that can be used to cut down trees. To cut a tree 18 inches in diameter requires five sticks of dynamite: one on the north, south, east and west sides of the tree, and the ... you instruct the diver to put the fifth stick of dynamite if you wanted the tree to fall north? -Riddles

Last Answer : It doesn't matter where the fifth stick is placed, since the tree won't fall in any direction. Being wood, it will float and rise to the surface.

Description : What is Straps to sticks on your feet and swoosh down a hill?

Last Answer : That loosely describes skiing.

Description : Is there a keyboard that doesnt make a sound when the keys are pushed?

Last Answer : If your looking for a keyboard that doesn't even click when you type you want a rubber role up keyboard, they are damage proof and silent.

Description : Out of a man's mouth it comes forth, lightening hearts and inspiring souls to be steadfast. Tales of old it tells, of warriors and kings, of castles and dungeons. It tells of sunshine and hills, ... and delight. It carries on through ages and never an ending does it find. What is it? -Riddles

Last Answer : A song.

Description : When I press Ctrl+Alt+Del, type taskmgr.exe into the cmd line it doesn't start. How can I fix this?

Last Answer : upgrade to SP3 for starter. You can also access the Task Manager by right clicking on the start bar and click Task Manager. Also look in the control panel under things like ‘Keyboard & Mouse” try and find the ‘shortcuts’ window.

Description : How can I find out what the "F" keys at the top of my keyboard are for?

Last Answer : What exactly is it that you want to know about them? They do a lot of different things, depending on what program you're using. F1 is usually a help key, in a lot of standard programs. F8 and/or F10 are often used as keys that can be hit at startup to bring up setup keys.

Description : Assigning F keys to tasks?

Last Answer : Yah, you can swap Ctrl and Command.