1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gnom [1K]
2 years ago
6

1. A teacher asked a student to capture and print out a one-slide presentation using MSWord,       showing everything on the scr

een.
i)       What keys or combination of keys can be used to carry out this operation ?
ii)     Describe the procedures to be followed by the student in carrying out this operation?
iii)  Describe the procedure to be followed by the student in carrying out this assignment using the keyboard.
b) A system Analyst was hired to set up a computer laboratory for Gan di Gan International      School,
    i.) Mention three hardware devices the analyst would need to set up the laboratory
   ii) List two database applications likely to be recommended by the analyst
  iii) State five Word Processing packages likely to be installed

​
Computers and Technology
1 answer:
Drupady [299]2 years ago
6 0

The keyboard combinations that can be used to capture and print out a one-slide presentation using MSWord, showing everything on the screen is Function key + PrtScr

<h3>What is a Key Combination?</h3>

This refers to the procedure that is used to combine two or more keys on the keyboard to execute a task.

Hence, we can see that the procedure that can be used to carry out the operation is:

  • Enter the screen you want to capture and print
  • Press the Function key, followed by the PrtScr. Please note this can vary slightly, depending on the keyboard.

The hardware devices that would be needed to be set up by the system analyst at a computer laboratory are:

  • System Unit
  • Laptops/Monitor
  • Power adapters
  • Ethernet cables, etc

The database applications that can be recommended by the system analyst are:

  • MySQL,
  • SQL Server

The five word processing packages that are likely to be installed are:

  • G00..gle Docs
  • MsWord
  • MSOffice
  • Dropbox Paper
  • Corel WordPerfect

Read more about word processing here:

brainly.com/question/985406

#SPJ1

You might be interested in
Women make up 52 percent of the voting-age population and are more likely to vote, yet
NeX [460]
<span>Gender discrimination has been a prevalent issue that prevented a century of women not to participate.

Discrimination has become widespread nowadays ranging from gender discrimination, racial discrimination, work discrimination and many others.These types of discrimination are experienced by almost all people everyday without them even knowing it. Some discrimination lies behind a sweet smile and an accommodating eyes and in order to defend yourself against this discrimination you need to load up yourself of a lot of self confidence.</span>
3 0
3 years ago
Read 2 more answers
Now for our sponsor Raid:Shadow legends
Xelga [282]

Answer:

Cool?

Explanation:

3 0
3 years ago
Read 2 more answers
Which of the following kinds of software provides the capabilities of paint software and also includes the ability to enhance an
Tomtit [17]
Image editing tools like photoshop and GIMP?
6 0
4 years ago
How are clustering and Network Load Balancing similar?
Elza [17]

Answer:

Load balancing is the mechanism happening between the different components to achieve the aim independently in the server. They are not aware of the presence of the other resources with them.

Clustering is the process in which the components work to gain the desired results in the form of group.They work in group so that there are no chances of crash  in server.

The similarity arises between these two process are :

  • They have capability to work even after failure of system
  • Can have unnecessary access to the information
  • Scalable

5 0
3 years ago
Operation code field is present in:
Tasya [4]
The answer is most likely C
6 0
3 years ago
Other questions:
  • Assuming that data mining approaches are to be used in the following cases, identify whether the task required is supervised or
    12·1 answer
  • If Asa changes the text to bold, he has changed the style. True False
    8·2 answers
  • What safety feature melts to protect a circuit? a. fuse b. diode c. three-prong plug d. transistor
    10·2 answers
  • Which of the selection below does not represent a workable IP address?
    9·1 answer
  • Which of the following is time-dependant? Group of answer choices
    8·1 answer
  • Write a short note on Magnetic tape as a secondary storage device​
    6·1 answer
  • Jacob is a website designer. Whenever his company takes on a new project, Jacob takes the initiative and comes up with ideas and
    14·1 answer
  • Busco....................... Novio
    8·2 answers
  • A constraint that is concerned with cost and must be considered when designing is Group of answer choices Economic Aesthetic Pol
    6·1 answer
  • A network administrator is importing a list of certificates from an online source, so that employees can use a chain of trust an
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!