1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
musickatia [10]
4 years ago
12

To select all the text in a document, press ____.

Computers and Technology
2 answers:
rewona [7]4 years ago
7 0
For microsoft word, press 'select' in upper right corner then 'select all'
nlexa [21]4 years ago
6 0
Press 'Ctrl' and then while holding down 'Ctrl' press 'A'
You might be interested in
Which Internet security risk is associated with dumpster diving?
lora16 [44]

Which Internet security risk is associated with dumpster diving? Identity theft. Identity theft is associated with dumpster diving because it involves taking something from someone else. In this case, instead of looking through a dumpster to get items that were someone elses, they are taking their identity and using it for their own purposes. So identity theft and dumpster diving relate when used in this context.

3 0
4 years ago
Read 2 more answers
Which user input device is used with a PDA? The user input device for a PDA is a (an) blank?
olchik [2.2K]
For latest models of Pocket Digital Assistant or handheld devices, a touch screen input with or without stylus is the main input hardware/device.

For the older models, keyboard or personalized keyboard is the input hardware for the device.
4 0
3 years ago
Read 2 more answers
Two technicians are discussing shielded cable. Technician A says that shielded wires are generally twisted in pairs to cancel th
Black_prince [1.1K]

Technician A is Correct. So this is actually a question I just had come up in my IT-140 Networking Fundamentals class but as a matter of fact I also know this because I've worked as a Network Technician for many years now both as a salaried employee and as an Independent Contractor. The reason Technician A is correct is because, indeed Wires in a Shielded Twisted-Pair (STP) cable or even Unshielded Twisted-Pair (UTP) cable are intentionally made this way for two reasons: the expressed purpose of actually twisting the wires in the first place is to protect them from interference called "EMI" (as stated in the question, Electromagnetic Interference!), however they are also twisted this way because of a similar interference (and in most cases, classified as the same kind of disturbance) called RFI or Radio Frequency Interference. As a technician, one of my jobs was hanging Access points in ceilings, and a requirement of that particular job was to make sure that these cables (which in this case were Cat6 which is short for Category 6, the exact cable that is referred to in the question, because Category 6 cable is shielded) were not to be left laying on the ceiling tiles in the drop ceilings! The reason being is, the light fixtures have electricity running through them, and anything with electricity running to it gives off Electromagnetic Interference. So, again Technician A is correct but... I have to say this as a side note... it would be <em>completely</em> pointless and utterly time consuming to remove these cables and replace them with a straight wire <u>just</u> because the warranty expired on a vehicle. Besides... Straight Though Wire and Twisted Pair are used for two completely different things.

Hope this helps! If you'd like to fact check me, google "emi interference"

CJ

3 0
4 years ago
Which of the following is an example of how science can solve social problems?
Minchanka [31]

Answer:

It can identify the sources of polluted water.

Explanation:

Science can be defined as a branch of intellectual and practical study which systematically observe a body of fact in relation to the structure and behavior of non-living and living organisms (animals, plants and humans) in the natural world through experiments.

A scientific method can be defined as a research method that typically involves the use of experimental and mathematical techniques which comprises of a series of steps such as systematic observation, measurement, and analysis to formulate, test and modify a hypothesis.

An example of how science can solve social problems is that it can identify the sources of polluted water through research, conducting an experiment or simulation of the pollution by using a computer software application.

In conclusion, science is a field of knowledge that typically involves the process of applying, creating and managing practical or scientific knowledge to solve problems and improve human life.

3 0
3 years ago
Read 2 more answers
need the answer ASAP. I’ll mark brainliest <br><br> they’re all the same options for each sentence.
KengaRu [80]

Answer:

Explanation:

pop(): Remove an item from the end of an array  

push(): Add items to the end of an array  

shift(): Remove an item from the beginning of an array  

unshift(): Add items to the beginning of an array

4 0
3 years ago
Other questions:
  • All of these are required categories on a safety data sheet except
    14·2 answers
  • In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable.
    5·1 answer
  • A windows host sends a tcp segment with source port number 1200 and destination port number 25. the sending host is a(n) _______
    10·1 answer
  • Alessandro wants to use his desktop computer to video chat with his mother. What hardware does he need to accomplish this?
    9·1 answer
  • Read the section of the article named "Duties." Which selection from the section shows a way that advertising managers get custo
    15·1 answer
  • Can someone help me on a 60 second ringtone :(
    9·1 answer
  • COMO DEFINES LAS PALABRAS COMPUTADOR Y DISPOSITIVO? MENCIONA EJEMPLOS
    13·1 answer
  • How can a user remove or delete a Pivot Table?
    8·1 answer
  • On March 2, 2022, is birthday wish me a happy birthday
    12·2 answers
  • A network administrator is importing a list of certificates from an online source, so that employees can use a chain of trust an
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!