1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MAVERICK [17]
3 years ago
9

To decrease a font size, use the ____ shortcut keys. (points : 2) ctrl

Computers and Technology
1 answer:
ch4aika [34]3 years ago
4 0
Ctrl + shift + - are the keys you press
You might be interested in
1. The letters that appear after the dot after a file name are called the:
Murrr4er [49]

Answer:

Files Extension.

Explanation:

The letters that follow the period at the end of a file name are the file's extension. This enables the computer to know what application it should use to read the file.

7 0
2 years ago
What is the processing speed for the second generation of computers​
natima [27]

Answer:

10mbps

Explanation:

that's what the internet says

5 0
3 years ago
list the six external parts of a computer system, identify which is the output device and which is the input device?
Mariulka [41]
1.mouse input
2.keyboard input
3.monitor output
4.speakers output
5.printer output , and input if has scanner
5.microphone input
4 0
4 years ago
Read 2 more answers
The /tmp directory is a temporary directory and will not exist on a system at all times. True or False?
jeka94

Answer:

False.

Explanation:

The /tmp directory is a directory that contains files that are required temporarily and also for temporary storage of data.The data inside the /tmp directory gets deleted when the system boots or shuts down.Since the directory exists permanently the content inside it is temporary.

So we can conclude that the answer is False.

5 0
3 years ago
In December of 2009, hackers broke into computer systems and stole secret defense plans of the United States and South Korea. Th
svetlana [45]

Answer:

Cyberterrorism

Explanation:

Cyberterrorism is unlawful use and exploitation of computers and networks (internet) by an individual or a group.

This is done to carry out illegal activities that can cause serious harm to people, government or causing large scale damage to computer systems.

The motivation behind cyberterrorism is usually to achieve some political or ideological or personal objectives, to cause disruption and coercion in a community, to damage the security systems or other government programs thus causing "terror".

Cyberterrorism is done using internet to cause damage to other computer systems  by means of malicious software in order to create disruption, terror or stealing the sensitive information.

For example the cyber terrorists can steal confidential information of military department by attacking the security systems for some political gain just as the hackers stole secret defense plans of US and South Korea which was an act of cyberterrorism.

7 0
4 years ago
Other questions:
  • Which is the most likely problem with a static layout?
    5·2 answers
  • What changes do you need to a algorithm to compare 100 numberst
    7·1 answer
  • Hich of the following usually indicates that there is no moreinput to be read by a program?
    14·1 answer
  • Boolean expressions are named after ____
    9·1 answer
  • What is the maximum duration of daily scrum meetings A:15minsB:45minsC10mins:30mins
    7·2 answers
  • Why is personal responsibility important when considering technology?​
    14·2 answers
  • 3.18: Pizza Pi Joe’s Pizza Palace needs a program to calculate the number of slices a pizza of any size can be divided into. The
    7·1 answer
  • HELP PLS TIME LIMIT HERE
    11·1 answer
  • A (an) block can arise from set ways of thinking.
    15·1 answer
  • Even if you cannot afford it you should donate at least 5 of your earnings to charity true or false
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!