1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
noname [10]
3 years ago
9

Double clicking a word selects the entire word?

Computers and Technology
2 answers:
tekilochka [14]3 years ago
8 0
Yes when u double click it select entire word
igor_vitrenko [27]3 years ago
7 0
Yes. This is correct. :)
You might be interested in
Name 6 examples of how telemedicine is used in healthcare
swat32

Answer:

The digital transmission of medical imaging, remote medical diagnosis and evaluations, and video consultations with specialists are all examples of telemedicine.

Explanation:

3 0
3 years ago
My window key dont work and I dont have a fn button, what can I do?<br> PLS help me.
Black_prince [1.1K]

Answer:

click on window button thought mouse or press esc and ctrl key at same time to open start menu option or to type window+r to open run dialog box

4 0
4 years ago
Match the components of a blog to their descriptions.
motikmotik

Answer:

Explanation:

1. entry title - name of the posting

2. permalink - place where a blog posting is located

3. entry date - when the posting became available

4. comment - allows users to add to the conversation

3 0
3 years ago
Which of the following scanning technique attackers use to bypass firewall rules, logging mechanism, and hide themselves as usua
cestrela7 [59]

Answer: Stealth scanning technique

Explanation:

Stealth scanning technique consist of the following types of scans :

1. FIN scan

2. X- MAS tree scan

3. NULL scan

The FIN scan responds by considering port open if response in received for its packet sent with the fin flag else considered closed.

The X-MAS tree scan fires up by setting a  TCP packet with URG, PUSH, FIN flags and the port is considered open if no response.

NULL scans sends null packet and considers it to be an open port.

Stealth scanning techniques considers to get some response from the network with out actually using a handshaking and is used to bypass firewall rules, logging mechanism, and hide themselves as usual network traffic.

3 0
4 years ago
Identify way computer are used in television production​
Aleonysh [2.5K]

Answer:

image editing, text om screen, weather graphics, animation, sattelites ... a lot more possibilites are endless just limited

3 0
3 years ago
Other questions:
  • Which structure is sometimes called the "gateway to memory"?
    14·1 answer
  • Some files appear dimmed in one of the default folders on your computer. What would be the best course of action? A. Leave the f
    5·1 answer
  • When you don't have enough room to stop, you may _______ to avoid what's in front of you. A. speed up B. steer away C. brake
    7·2 answers
  • Write a program that accepts 5 number and arrange them in ascending order​
    7·1 answer
  • To prevent unauthorized access and use, at a minimum a company should have a written __________ that outlines the activities for
    6·1 answer
  • Problem 3. Consider the following recurrence, defined for n a power of 4 (for the time of some algorithm): T(n) = 3 if n = 1 2T(
    5·1 answer
  • Select three areas that should be included in a contract consultant’s business expense model.
    11·1 answer
  • What is a common practice that enterprise organizations will implement to ensure the users of a network and a Mobile Device Mana
    12·1 answer
  • What can help you estimate how much money you might get in
    7·1 answer
  • Which term originated on social media?<br> O A. LOL<br> O B. Unlike<br> O C. Notebook<br> D. Word
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!