1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tresset_1 [31]
3 years ago
9

Type the correct answer in the box. Spell all words correctly.

Computers and Technology
2 answers:
Tom [10]3 years ago
8 0

Answer:

navigate keys

Explanation:

the up and down keys are to scroll through documents and pages.

dexar [7]3 years ago
5 0

Answer:

navigation

Explanation:

I took the test and got it right

You might be interested in
Why is it important to write something in the subject line of emails?
marin [14]
So the person can know what you want and it helps keep better track of emails and subject matters
8 0
3 years ago
Read 2 more answers
What is the likely long-term consequence of an increase in the relative percent of greenhouse gases in Earth’s atmosphere?
NemiM [27]

Answer:

Earth's average temperature will increase.

Explanation:

5 0
3 years ago
Problem 1. MST - Prim's and Kruskal's algorithms
Juli2301 [7.4K]
Or maybe not Encryption converts the data in a database to a format that is indecipherable to unauthorized users who attempt to bypass the DBMS.

a. True
b. False
7 0
3 years ago
Describe the components of the Ethernet frame in detail?
Marta_Voda [28]
Starts with an Ethernet header, which contains destination and source MAC addresses as its first two fields
7 0
3 years ago
Noah is saving his Excel spreadsheet as shown.
AnnZ [28]

Answer:

DiverseNames.xls

Explanation:

3 0
3 years ago
Other questions:
  • A company is experiencing overwhelming visits to a main web server. The IT department is developing a plan to add a couple more
    5·2 answers
  • How is the Internet Simulator similar to the Actual Internet? How is it different?
    7·1 answer
  • When a packet with the code is transmitted, it is received and processed by every machine on the network. this mode of operation
    12·1 answer
  • Over the last few years, security cameras and other devices have become more common. Some people argue that these measures viola
    14·2 answers
  • Are one of the greatest features of Photoshop that allow nondestructive editing of images.
    6·1 answer
  • Write a program with a method computeCommission which takes a double that is the salesAmount and returns the commissions for sal
    9·1 answer
  • What command displays detail information about the OSPF interfaces, including the authentication method?
    7·2 answers
  • PLZ help
    5·1 answer
  • Given two strings s and t of equal length, the Hamming distance between s and t, denoted dH(s,t), is the number of corresponding
    6·1 answer
  • A user’s laptop hard drive contains sensitive information. The user often plugs the laptop into the corporate network. A sensiti
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!