1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stels [109]
3 years ago
13

When you're working with a word processing document and you press the Del key, what happens?

Computers and Technology
1 answer:
Vlada [557]3 years ago
7 0
I believe that everything to the right of the cursor is deleted.
You might be interested in
What piece of software tells the operating system how to use a specific hardware device?
professor190 [17]
A driver for that hardware specific task. Like Nvidia makes GPU's so they also make GPU drivers
8 0
4 years ago
Earth's current era is the _______ era.
natita [175]
We are in the Cenozoic Era
6 0
4 years ago
Read 2 more answers
What helps in determining the reliability of a person to repay debt?
faust18 [17]

C. The amount of credit score

3 0
3 years ago
Read 2 more answers
A lead views a specific page on your website, say, your case study page. You then send targeted follow-up content like one of yo
IRINA_888 [86]

Answer:

Behavioral Email                                

Explanation:

A behavioral email is an automated email which is sent to recipients on the basis of their behavior. These emails are sent after a user communicates with a business on social media, the company’s website, email, and other communication medium. Behavioral emails help to grow customer involvement and sales. Behavioral email can also be used as a marketing strategy, used by marketers to gather data about an email subscriber in order to send targeted content to that subscriber on the basis of his behavior or actions. When the marketer sends an email to the customer, it is appropriate for that customer, based on the data gathered and their current monitored behavior. Behavioral email helps to understand costumer needs. It helps to get an idea of a customers preferences by inspecting his behavior.

5 0
3 years ago
____ are likely in the event of a hacker attack, when the attacker retreats to a chat room and describes in specific detail to h
Masja [62]

Answer:

Follow-on incidents.

Explanation:

When the hacker hacks something successfully and after that when he or she  discusses or describes the details to his or her associates and the method which he or she used to do the hacking is called Follow-on incidents because the hacker has successfully completed his or her conquest the event is happening after that.

4 0
3 years ago
Other questions:
  • In these ones all your finding is the mean(average).
    14·1 answer
  • What problem does chlorofluorocarbon (CFC) create?
    5·1 answer
  • The first step in the information processing cycle involves the _____ of data.
    10·1 answer
  • What is the purpose of a Macro in Word?: *
    13·1 answer
  • What is syntax?
    15·1 answer
  • ¡Hola! He visto en muchos comentarios de Twitter "svd" cuando alguien dice "dale fav a este Tweet y siganse entre ustedes" y en
    8·1 answer
  • CSCU EXAM TEST FINAL1-A software or hardware that checks information coming from the Internet and depending on the applied confi
    6·1 answer
  • Explain with examples what is software​
    6·1 answer
  • How to ignore punctuation before and after a word javascript
    13·1 answer
  • You are investigating the use of website and URL content filtering to prevent users from visiting certain websites. Which benefi
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!