1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Snowcat [4.5K]
3 years ago
11

When entering new data into your table, which key should you press to move from one field or cell to the next?

Computers and Technology
1 answer:
prohojiy [21]3 years ago
6 0

Answer:

Tab key or Enter key is the correct answer.

Explanation:

When the user want to move from one cell to another cell or field then they use the tab key or enter key. If the user wants to fill data vertically then, they use Enter key to move one cell to another and id they wants to fill data horizontally then, they use Tab key to move on the next cell. So, that's why when they want to fill data in Row or Column then, they use tab key or enter key.

You might be interested in
The operating system provides a ____, which is the means with which you interact with the computer
Soloha48 [4]
One answer could be a GUI = Graphical User Interface (e.g. Windows Explorer).
4 0
4 years ago
Which of the following is not a language commonly used for web programming? PHP Assembly Java Python
Nataly [62]

Answer:

If you’re a software developer, then you probably—every now and then—feel overwhelmed by the super-fast pace at which our industry evolves, and that’s fine. I certainly feel that way sometimes, especially when trying to keep up with the latest trends.

But it’s possible to be well-informed about what’s going on out there, and use that information to your advantage, by being economical about your learning.

Sure, there are lots of programming languages. Sure, new ones keep being created every week—and don’t even get me started on JavaScript frameworks.

Do you need to learn all of them? Of course not.

First, learn about a number of the most popular programming languages. Then, narrow that list down, by picking the ones that make the most sense for your current knowledge level, employment status and other criteria that might make sense for your scenario.

For instance, if you intend to learn the functional paradigm, then pick a functional language from the list. Rinse and repeat.

That’s what this post is about. We’ve done the legwork for you, compiling a list of five of the most popular programming languages for 2019. Now you only have to read it and put it to good use.

(Hope this helped if not i am so so sorry hope you have a blessed day goodbye)

7 0
3 years ago
Read 2 more answers
A news company is planning to use a Hardware Security Module (CloudHSM) in AWS for secure key storage of their web applications.
lakkis [162]

Answer:

you cannot obtain a new copy of the keys that you have stored on Hardware Security Module, because they are lost forever and a new copy cannot be obtained if a copy is not kept somewhere.

Explanation:

Hardware Security Module (CloudHSM) is a cloud-based hardware security module (HSM) that provides the user the opportunity to create and utilize your own encryption keys on the AWS Cloud. It is a fully managed service that takes care of time-consuming administrative activities such as software patching, backups, hardware provisioning, and high-availability for the user.

One of the key elements of the Hardware Security Module (CloudHSM) is that a copy of the keys stored must be kept somewhere because if keys are lost, they are lost forever and a new copy cannot be obtained if a copy is not kept.

Therefore, you cannot obtain a new copy of the keys that you have stored on Hardware Security Module, because they are lost forever and a new copy cannot be obtained if a copy is not kept somewhere.

5 0
3 years ago
36 points!!
nataly862011 [7]
It’s A, the law created a right to minimum wage for all workers. Also crates the right for overtime pay and does not allow child labor.
7 0
3 years ago
Read 2 more answers
A network technician attempts to ping www.example.net from a customer computer, but the ping fails. access to mapped network dri
S_A_V [24]

It appears that the local network connection (ethernet, Wi-Fi, etc.) is working but the gateway to the WAN is down.

8 0
3 years ago
Other questions:
  • Which group on the Home Ribbon contains the line spacing attribute?
    9·2 answers
  • Write a program which will use a template version of search function(4 points): Randomly generate a list of 100 integers(1 point
    11·1 answer
  • The conscious process of planning and controlling how you spend your time is called?
    15·1 answer
  • To maintain her audience's confidence in her, what should kiara not do while delivering her presentation?
    6·2 answers
  • Select the layer of the OSI model that is responsible for reformatting, compressing, and/or encrypting data in a way that the ap
    14·1 answer
  • Que significa DESFRAGMENTAR EL DISCO DURO?????
    14·1 answer
  • Consider the following class, which models a bank account. The deposit method is intended to update the account balance by a giv
    8·1 answer
  • Can’t be opened because apple cannot check it for malicious software.
    15·1 answer
  • Some operating systems add the command interpreter to the kernel .what will be the justification for this design principle?
    11·1 answer
  • What are some of the key system-oriented trends that have fostered is-supported decision making to a new level?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!