1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tresset_1 [31]
3 years ago
9

Type the correct answer in the box. Spell all words correctly.

Computers and Technology
2 answers:
Tom [10]3 years ago
8 0

Answer:

navigate keys

Explanation:

the up and down keys are to scroll through documents and pages.

dexar [7]3 years ago
5 0

Answer:

navigation

Explanation:

I took the test and got it right

You might be interested in
Time (non-statistical) division multiplexing differs from frequency division multiplexing because it:
yan [13]

Explanation:

We can divide the multiplex in different categorize, for example:

  • FREQUENCY DIVISION MULTIPLEXERS (FDM)
  • TIME DIVISION MULTIPLEXERS (TDM)
  • STATISTICAL TIME DIVISION MULTIPLEXERS (STDM).

But in this case, we're going to explain about the time and frequency, because the time division multiplex differ to frequency, because the circuit is divided horizontally, and the time is vertically

b. splits the communication circuit vertically (with time slots) instead of horizontally

7 0
3 years ago
Methods for preventing/overcoming group conflict include all EXCEPT:
kondor19780726 [428]

Answer:

recognizing that gender differences are a myth.

Explanation:

The options are:

  • active listening.
  • recognizing that gender differences are a myth.
  • structured debate.
  • building cross-cultural understanding

Without active listening, structured debate, and cross-cultural understanding group conflict are definitely on the card. However, no one now is concerned about gender differences. As now both the genders are already having the equal status in at least developed countries. However, this too can play a role in avoiding group conflict. However, since this is not that important considering the current context, this looks like being the correct option here. Hence, the above mentioned in the answer section is the correct option.

7 0
3 years ago
In the web form you are creating, you want a multiple-option select list to appear with five options. which line of html code wi
suter [353]
You will use a <select> for this. For example:

<select name="choice">
  <option>First</option>
  <option>Second</option>
  <option>Third</option>
  <option>Fourth</option>
  <option>Fifth</option>
</select>
5 0
3 years ago
An administrator needs to protect rive websites with SSL certificates Three of the websites have different domain names, and two
Marysya12 [62]

Answer:

Option A (One SAN certificate) is the right answer.

Explanation:

  • A vulnerability management certificate that permits many domain identities to be safeguarded by such a singular or unique certification, is considered a SAN certificate.
  • Though on the verge of replacing common as well as accepted security credentials with either of these de-facto certifications.

Other alternatives are not connected to the given scenario. Thus the above option is correct.

5 0
3 years ago
Soldering is a method of
babymother [125]

Answer:

Is a process in which two or more metal items are joined together by melting

Explanation:

: )

4 0
3 years ago
Read 2 more answers
Other questions:
  • Sarah maintains a blog about her soap-making business, and she has hired someone to create a database for this business. She mak
    6·1 answer
  • The brainly home page uses about 112% of my cpu. (On chromebook) any ideas to help increase performance?
    7·2 answers
  • In a Windows environment, __________ is a powerful tool that enables security administrators to share user and group definitions
    10·1 answer
  • Discuss the benefits of a system safety effort other than improved safety
    8·1 answer
  • The following code accomplishes which of the tasks written below? Assume list is an int array that stores positive int values on
    9·1 answer
  • Unwanted email sent to large groups of people who did not request the communication is called _____
    12·1 answer
  • Which term is used in object-oriented programming to reference characteristics of an object?
    15·1 answer
  • F1: 2^14 formula ....................................................................
    10·1 answer
  • A digital footprint is .
    7·1 answer
  • How can edge computing be used to increase sustainability
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!