1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gnom [1K]
2 years ago
6

1. A teacher asked a student to capture and print out a one-slide presentation using MSWord,       showing everything on the scr

een.
i)       What keys or combination of keys can be used to carry out this operation ?
ii)     Describe the procedures to be followed by the student in carrying out this operation?
iii)  Describe the procedure to be followed by the student in carrying out this assignment using the keyboard.
b) A system Analyst was hired to set up a computer laboratory for Gan di Gan International      School,
    i.) Mention three hardware devices the analyst would need to set up the laboratory
   ii) List two database applications likely to be recommended by the analyst
  iii) State five Word Processing packages likely to be installed

​
Computers and Technology
1 answer:
Drupady [299]2 years ago
6 0

The keyboard combinations that can be used to capture and print out a one-slide presentation using MSWord, showing everything on the screen is Function key + PrtScr

<h3>What is a Key Combination?</h3>

This refers to the procedure that is used to combine two or more keys on the keyboard to execute a task.

Hence, we can see that the procedure that can be used to carry out the operation is:

  • Enter the screen you want to capture and print
  • Press the Function key, followed by the PrtScr. Please note this can vary slightly, depending on the keyboard.

The hardware devices that would be needed to be set up by the system analyst at a computer laboratory are:

  • System Unit
  • Laptops/Monitor
  • Power adapters
  • Ethernet cables, etc

The database applications that can be recommended by the system analyst are:

  • MySQL,
  • SQL Server

The five word processing packages that are likely to be installed are:

  • G00..gle Docs
  • MsWord
  • MSOffice
  • Dropbox Paper
  • Corel WordPerfect

Read more about word processing here:

brainly.com/question/985406

#SPJ1

You might be interested in
On hearing my name, you may think that I am iterative, but I play a vital role in networking by boosting the signal strength to
natka813 [3]

Answer:

A Repeater

Explanation:

A Repeater takes a signal, and then repeats it - in order to boost it.

Iteration is also the repetition of something, which sounds like what a repeater would do.

4 0
3 years ago
Which output will be displayed by the following program?
wolverine [178]

Answer:

h

Explanation:

5 0
3 years ago
Read 2 more answers
Sarah maintains a blog about her soap-making business, and she has hired someone to create a database for this business. She mak
ivann1987 [24]
The database planner would most likely create a table that contains customer contact information since these would be the individuals who placed an order for Sarah's products after visiting her blog. 
4 0
3 years ago
Noah's document was very plain and would not catch the readers' attention. Select each item below that would make
Umnica [9.8K]

Answer:

1,2,3

Explanation:

4 0
3 years ago
​______________________ is a general security term that includes computer​ viruses, worms, and trojan horses.
VashaNatasha [74]
Malware
-------------------
6 0
3 years ago
Other questions:
  • Which statements describe the advantages of using XML?
    12·2 answers
  • What does OLE stand for? Object
    8·2 answers
  • ​A(n) ____ will hold an online auction buyer’s payment until he or she is satisfied that the item bought matches the seller’s de
    13·1 answer
  • Your license can be canceled if you __________
    14·2 answers
  • Which of the following will you select as X in the following series of clicks to lay the title over a chart: Chart Title box &gt
    14·1 answer
  • how to answer the questions on brainly? I've typed my answer in the box but there's no submit button or whatever, and the only t
    14·2 answers
  • Which email client feature allows you to store the names and information of people you contact frequently?
    5·1 answer
  • Which of the following attack is a threat to confidentiality?
    10·1 answer
  • Question 4: What will be the output of the code? Show a complete analysis.
    6·1 answer
  • The main function of a(n) ____________________ is to centralize access control for the network by keeping an eye on both inbound
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!