1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
leonid [27]
2 years ago
11

What is the shortcut key to create a new desktop ​

Computers and Technology
2 answers:
Reil [10]2 years ago
8 0

Answer:

click on new desktop button or click window key+ctrl+D

Rom4ik [11]2 years ago
6 0

Answer:

Win + Ctrl + D

Explanation:

Stay safe, stay healthy and blessed.

Have a good day !

Thank you

You might be interested in
g How safe is to have a LinkedIn account where you have published all the important information about yourself
irina [24]

Answer:

LinkedIn is very safe

Explanation:

LinkedIn is very safe, that being said you should never post private information about yourself anywhere that you do not want others to see/know. LinkedIn is a job recruiting and networking site, meaning that all the information that you have or will be publishing there should be related to your career. There is no reason for you to publish private information such as document numbers, social security number, address, bank account info, etc.

5 0
3 years ago
Read 2 more answers
FREEE POINTS
BigorU [14]

Answer:

Thank you that's so very kind of you. Hope your having a good day.

3 0
3 years ago
Read 2 more answers
What was the computer works in binary functions
Mariulka [41]
Computers use binary - the digits 0 and 1 - to store data. A binary digit, or bit , is the smallest unit of data in computing.
7 0
3 years ago
Which of the following terms best describes the security domain that relates to how data is classified and valued?
d1i1m1o1n [39]

Answer:

c) Access Control.

Explanation:

The term which describes the security domain best that relates to  how the data is valued and classified is Access Control.

Access Control :It is the restriction of access of a resource or a place that is selective.Permission to access a resource is called authorization.It is an important term in the field of information security and physical security.

7 0
3 years ago
Can you run microsoft office on a chromebook
zimovet [89]
Yes, you can Microsoft office in a Chromebook.
6 0
4 years ago
Other questions:
  • _______________ is used by a hacker to mask intrusion and obtain administrator permissions to a computer.
    7·1 answer
  • What is the difference between print and nonprint sources?
    9·1 answer
  • Write a program that converts degrees Fahrenheit to Celsius using the following formula. degreesC = 5(degreesF – 32)/9 Prompt th
    6·1 answer
  • You’re browsing the internet and realize your browser is not responding. Which of the following will allow you to immediately ex
    11·1 answer
  • A _____ is made up of rows and columns and is used to organize information.
    12·2 answers
  • You have a network that occupies the top floor of a three-story building. The WAN service provider has installed the line for th
    11·1 answer
  • Consider we have n pointers that need to be swizzled, and swizzling one point will take time t on average. Suppose that if we sw
    11·1 answer
  • Describe the cutting-edge program that is referred to as agile
    5·1 answer
  • 3. List three common vector image file types.
    7·1 answer
  • What is the hack of the cookie clicker
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!