1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lilit [14]
3 years ago
12

Hich function would be used to remove a section of text from a document?

Computers and Technology
1 answer:
Westkost [7]3 years ago
7 0
Highlight the text and press delete
You might be interested in
How many websites are mobile friendly?
777dan777 [17]

Answer:

Almost 80 percent of websites are mobile friendly

Explanation:

7 0
4 years ago
Information technology has powerful effects on social behavior. Which of the following issues should NOT be expected when intera
AfilCa [17]

Increased inhibitions and a decreased likelihood that all members will contribute to the discussion is the following issues should NOT be expected when interacting with teammates via information technology

b. Increased inhibitions and a decreased likelihood that all members will contribute to the discussion.

<u>Explanation:</u>

In information technology, social behaviour will effect more powerful in industries. In digital medial those use mobile everybody is a media person, easily share the important to social media and sharing person doesn’t aware of the effect of sharing the information.

If a piece of information is received or send both the sender and receiver should be aware of the importance of information make sure it should not be shared outside the group members or the world.

Once import information shared outside the world it can stop any given point time.

6 0
3 years ago
Convert ⅖ pie radian to degree​
aniked [119]

Answer:

Convert to a decimal.

22.9183118°

Explanation:

7 0
3 years ago
Computers represent color by combining the sub-colors red, green, and blue (rgb). Each sub-color's value can range from 0 to 255
maxonik [38]

Answer:

Follows are the code to this question:

#include <iostream>//defining a header file

using namespace std; //using namespace

int main() //defining main method

{

int red,green,blue,s; //defining integer variable

cout<<"Enter value: \n ";//print message

cin>>red>>green>>blue; //input value

if(red<green && red<blue)//defining if block that checks red value

s=red;//store red variable value to s variable

else if(green<blue)//defining else if block that checks green value less then blue

s=green;//store green variable value in s variable

else//defining else block

s=blue; //store blue variable value in s variable

//calculating red, green, blue value

red=red-s;//store red value

green=green-s;//store green value

blue=blue-s;//store blue value

cout<<red<<" "<<green<<" "<<blue;

}

Output:

Enter value:

130  

50

130

80 0 80

Explanation:

In the above code, inside the Main method, four integer variable "red, green, blue, and s" is defined, in which "red, green, and blue" is used for input the value from the user end.

  • In the next step, a conditional statement is used, that checks the red variable value, if the condition is true, it will store its value in the "s" variable, otherwise, it will go to else if block.
  • In this block, the green variable checks its value less than then blue variable value, if the condition is true, it will store the green value in the "s" variable, otherwise, it will goto else block.
  • In this block, it will store the blue variable value in the "s" variable, and subtract the value of "red, green, and blue" value from "s" and store its value, and at the last, it will print its value.    
4 0
3 years ago
D. DROP
just olya [345]

Answer:

The correct answer is B. BLOB.

6 0
3 years ago
Other questions:
  • How does a Computer chip work?
    6·2 answers
  • What are the technique CSP does for the Cloud Storage Security?
    10·1 answer
  • What common objects you think will benefit from embedded computers?
    15·1 answer
  • In the Remote Access Domain, if private data or confidential data is compromised remotely, you should set automatic blocking for
    15·1 answer
  • #Write a function called alter_list. alter_list should have#two parameters: a list of strings and a list of integers.##The list
    11·1 answer
  • Write an Assembly program in MIPS that does the following:
    7·1 answer
  • Q1 To remove filter
    15·2 answers
  • What happen if file server stops working?
    5·1 answer
  • After reading through the code, what will happen when you click run?​
    13·1 answer
  • Do you want my hero academia?<br><br><br><br><br><br> if so, who's your favorite character :&gt;
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!