1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aliun [14]
4 years ago
5

The Left Shift key is used to capitalize which keys?

Computers and Technology
2 answers:
pickupchik [31]4 years ago
5 0
They both do the same thing. 
Salsk061 [2.6K]4 years ago
5 0
You generally use the left shift key to capitalize the keys on the right side of the keyboard, as it is more difficult to capitalize and press the key with the same hand.
You might be interested in
I need help ASAP which option is an example of a resource that would most likely become a constraint in building a game
bezimeni [28]
Your answer will be Player Mechanics.

Constraint means a limitation or restriction ,
none of the others make sense as in the sense of holding it back
3 0
2 years ago
Read 2 more answers
What is output? Select all that apply. c = 3 while (c < 10): c = c + 2 print (c)
Sophie [7]

Answer:

5, 7, 9, 11

Explanation:

its on quizlet

8 0
3 years ago
A total stranger is trolling Jack online. He’s offended and annoyed. How can Jack stop the troll in his or her tracks? (5 points
zvonat [6]

Answer:

log off the web page would be the best answer here or explaining why trolling is rude but log off the web page is the best one here

5 0
3 years ago
Read 2 more answers
What does ip mean? internet protocol address internet program internet process (system software) internet prescience?
Mashutka [201]
Ip means internet protocol address
7 0
3 years ago
What are the five steps of ethical hacking?
Paraphin [41]

Answer

Explanation:

Hacking is simply gaining access into a computer through weaknesses that were found in the network system.

We have mainly 5 stages In ethical hacking which although must not be followed sequentially but could produce greater results if it was followed.

These stages includes

1. Reconnaissance

2. Scanning

3. Gaining access

4. Maintaining access

5. Covering tracks.

8 0
4 years ago
Other questions:
  • Question 3 / 5
    9·1 answer
  • If you bury a story on digg what have you done?
    7·2 answers
  • Which of the following is the shortcut key combination for pasting copied text?
    7·2 answers
  • The Boolean expression wxyz+u+v is equivalent to an expression in 3-CNF (a product of clauses, each clause being the sum of exac
    14·1 answer
  • Chevening is looking for individuals with strong professional relationship building skills, who will engage with the Chevening c
    15·1 answer
  • The marketplace for computer hardware:________ 1. has become increasingly concentrated in top firms 2. has expanded to include a
    5·2 answers
  • A two-dimensional array has been defined to hold the quantity of each of 5 different healthy snack products sold in a tuckshop d
    10·1 answer
  • Is computing gcse easy or hard
    10·2 answers
  • Who do we need more in the world? Computer technicians, or electric technicians and why.
    9·1 answer
  • Question 2:
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!