1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
seraphim [82]
2 years ago
15

A screen capture is a digital image of your screen, as if you took a picture of it with a camera. For instance, you might want t

o take a screen capture if an error message occurs and you want a Technical Support person to see exactly what's on the screen. You can create a screen capture using the Snipping Tool, an accessory designed to capture whole screens or portions of screens. To open the Snipping Tool, click the Start button on the Windows taskbar, type "sni", then click the Snipping Tool when it appears in the left panel. On the Snipping Tool toolbar, click New, then drag the pointer on the screen to select the area of the screen you want to capture. When you release the mouse button, the screen capture opens in the Snipping Tool window, and you can save, copy, or send it in an email. In Word, Excel, and PowerPoint 2016, you can capture screens or portions of screens and insert them in the current document using the Screenshot button in the Illustrations group on the Insert tab. Alternatively, you can create a screen capture by pressing [PitScn]. (Keyboards differ, but you may find the [PrtScn] button in or near your keyboard's function keys.) Pressing this key places a digital image. of your screen in the Windows temporary storage area known as the Clipboard. Open the document where you want the screen capture appear, click the Home tab on the Ribbon (if necessary), then​
Computers and Technology
1 answer:
GrogVix [38]2 years ago
5 0

The given narration talks about the different means of taking a screen capture on a Windows environment.

<h3>What is a Screen Capture?</h3>

This refers to the process where the content of a screen is captured in a digital image form that is saved in the Documents of the computer as a screenshot.

Hence, we can see that the author mentioned the various ways of using the snipping tool to capture whole or part screens and the precise procedure on how to do it.

Read more about screen capture here:

brainly.com/question/22654940

#SPJ1

You might be interested in
write a function that given an integer n returns the smallest integer greater than n the sume of whose digits is twice as big th
USPshnik [31]

The code below is written in javascript which gives us the integer,

<h3>The function code is</h3>

function solution (num){


//Javascript function


var x=0,sum=0,a,b;


var d=""; //variable declaration


var digits = num.toString().split('');


var Individual = digits.map(Number);


//console.log(Individual);


for (var i=0;i<Individual.length;i++)


{//For loop


x=x+Individual[i];


}


var y=x*2;


for(var i=0;i<Individual.length;i++)


{


sum=sum+Individual[i];


d=""+d+Individual[i];


if(sum==y)


break;


if(i==Individual.length-1)


{


i=-1;


continue;


}


}


console.log("the value is "+d);


}


var number = prompt("enter the number");


//Asking user for value...


console.log("the number is");


console.log(number);


solution(num

For more information on javascript, visit

brainly.com/question/16698901?referrer=searchResults

3 0
2 years ago
PLEASE HELP!!!!! (Environmental Science Semester 1)
uranmaximum [27]
I believe the answer would be B, Sorry if I'm wrong! ❤
6 0
3 years ago
Read 2 more answers
Give 3 reasons why it is believed that smart phones precent us from communicating face to face.give three reasons why it is beli
gregori [183]

Answer:

yes

Explanation:

because the people will be lazy to go and talk to that person instead They will call each other and discuss

7 0
2 years ago
When breaking a problem down, you often encounter elements that you want to use repeatedly in your code. Sometimes it's appropri
ddd [48]

<u>Answer:</u>

<em>FUNCTION:</em>

  • A function does not require the number of times that the <em>code script needs to be executed </em>
  • When we go for large programming, ie. while creating projects, we can invoke function from one file to another based on the access <em>specifier mentioned for the function. </em>
  • There is a stack call created in the memory whenever a <em>function is called. </em>

<em>LOOP :</em>

  • Whereas the number of times that the loop has to be <em>executed must be defined </em>
  • A loop cannot be called, it can be used only the code block in <em>which it is present. </em>
  • There is not overhead of creating a stack since it is not invoked and there is no <em>transfer of control from one module to another </em>

8 0
3 years ago
What security weaknesses/vulnerabilities exist in Wireless local area network device hardware and software?
AfilCa [17]

Answer:

Explanation:

There are many weaknesses/vulnerabilities, some of which are the following...

Default Network Hardware, many individuals will go out and buy a new router and install it in their home. These devices come with a preset configuration including a preset security password which is many times a default password used for every router of the same model. This can be easily obtained by anyone who can then access the network.

Access Point hacking, an experienced individual can use a packet sniffer to detect the SSID that is frequently sent from the router in order to create an access point to be able to access the network.

WEP encryption is another vulnerability. These are very low security passwords that can be cracked using different software in a short period of time.

These are some of many vulnerabilities that wireless local networks have, but there are also many precautions and security measures that can be taken to prevent them.

7 0
3 years ago
Other questions:
  • A geologist is part of what career feild
    6·1 answer
  • What do you call the number that is used as an index to pinpoint a specific element within an array?
    14·1 answer
  • Software that interprets commands from the keyboard and mouse is also known as the
    8·1 answer
  • What organization is responsible for the registration of Internet domain names?
    14·1 answer
  • What happens when two computers have the same IP address?
    13·1 answer
  • kieran wants to search a database quickly for information on the last time a patient came to his medical facility.The informatio
    14·2 answers
  • Describa la clasificación de los recursos educativos digitales abiertos. vea este video, para hacer eso
    11·2 answers
  • Explain any two types of board band connection​
    11·1 answer
  • What does the word collaborative mean?
    13·2 answers
  • if we try to use tail-recursive rules to implement non-tail-recursive rules, it will normally result in rules that are
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!