1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
klasskru [66]
3 years ago
14

The most efficient way to perform data entry is to keep your hands on the keyboard and press _______ to move to the next cell in

the row or press _______ to move to the next cell in the column.
A. Enter; Tab
B. Tab; Home
C. Tab; Enter
D. Home; Tab
Computers and Technology
1 answer:
SCORPION-xisa [38]3 years ago
5 0
The correct answer is C. Tab; enter
You might be interested in
Do anyone else receive random points from Brainly… because I swear I had like 2K+ something and I check and Im at ACE… and with
sergiy2304 [10]

Answer:

i had the same thing happen to me and no it doesnt make sense at all but....i found something out a while ago...

Explanation:

they have achievements and it helps with how you earn points and level up

6 0
3 years ago
A user clicked an email link that led to a website than infected the workstation with a virus. The virus encrypted all the netwo
Leno4ka [110]

Answer:

D

Explanation:

A zero-day vulnerability is a computer-software vulnerability that is unknown to those who would be interested in mitigating the vulnerability. Until the vulnerability is mitigated, hackers can exploit it to adversely affect computer programs, data, additional computers or a network. An exploit directed at a zero-day vulnerability is called a zero-day exploit, or zero-day attack.

5 0
3 years ago
Which of the following best describes the purpose of a design specification?
snow_lady [41]

Answer:

it is.    Describing the requirements for how a program will work or users will interact with it

Explanation:

mark brainlist

6 0
3 years ago
Read 2 more answers
is a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the members a
Sedaia [141]

Answer:

Intranet.

Explanation:

The intranet will provide the sharing of information within the organization. It does not provide the accessibility of the network or the sharing of information outside the organization. The main advantage of the Intranet is to improve communication between the employees.

The intranet is a private connection of LAN and WAN which are belongs to an organization it means this network is authorized by the employee within organization not outside the organization .

7 0
3 years ago
You have been hired by Beta Airlines to help them with their flight prices. You are to create a 10 x 10 2D array (also called a
AveGali [126]

Answer:

See explaination

Explanation:

//Array to store prices

INT PRICE[10][10]

//Loop through 2d array

FOR I FROM 0 TO 10

FOR J FROM 0 TO 10

//Populate a random int

PRICE[I][J] = RANDOM_INT(99,1999)

PRINT(PRICE[I][J]+" ")

PRINT()

//Prompt user for desired price

COST = READ_INPUT('Please enter your desired flight price: ')

//Variable to store if a match is found

MATCH = FALSE

//Loop through all ints in price

FOR I FROM 0 TO 10

FOR J FROM 0 TO 10

//Compare price with Cost

IF PRICE[I][J]==COST

MATCH = TRUE

BREAK

//Check if match is true

IF MATCH = TRUE

PRINT('A flight was found for that price, have a safe trip!')

ELSE

PRINT('No flight was found for that price, please try a new price.')

4 0
3 years ago
Other questions:
  • Briefly describe "SoftwareEngineering Framework". Do provide examples and diagrams wherenecessary.
    15·1 answer
  • Forms often allow a user to enter an integer. Write a program that takes in a string representing an integer as input, and outpu
    9·1 answer
  • What are two constraints that continuous-media files have that conventional data files generally do not have?
    12·1 answer
  • Micheal has increased the contrast of the given picture. Which feature or menu option of a word processing program did he use? A
    15·1 answer
  • Ann wants to save her presentation so she can work on it later. Which device on her computer can store this data long term?
    15·2 answers
  • (TCO C) When a remote user attempts to dial in to the network, the network access server (NAS) queries the TACACS+ server. If th
    14·1 answer
  • Xavier buys a computer for $525, which includes taxes. He pays for the computer over a 12-month period by paying $48.13 per mont
    8·2 answers
  • Assume that you have the business data in various sources such as Excel, .csv, text files and Access, Oracle databases. Write th
    9·1 answer
  • Which three statements are true of lossless compression?
    6·1 answer
  • In _________, the process requests permission to access and modify variables shared with others. a) entry section b) critical se
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!