1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tanzania [10]
4 years ago
9

_____ are special combinations of keys that tell a computer to perform a command.

Computers and Technology
2 answers:
Pie4 years ago
8 0

Answer:

Shortcut keys are the correct answer for the above question.

Explanation:

The shortcut keys are the special type of keys which is used to give the command for the various function on the computer. It is made up with the help of two or three keys from the keyboard layout. It is accessed by using ALT and CTRl key.

Just for example, when a user wants a copy all the text from any document, then he needs to press--

  1. CTLR+A(To select all text)
  2. CTRL+C(TO copy the text)

The above question asked about the combination of keys which is used to tell the command to perform some operation on the computer. Hence the answer is shortcut keys or keyboard shortcut keys (because it is pressed from keyboard).

boyakko [2]4 years ago
7 0
The answer is a Keyboard Shortcut.
You might be interested in
What is the first step necessary to begin setting up a website once a host has been selected and paid?
NemiM [27]

Answer: Select a domain name

4 0
3 years ago
Can someone please help and answer the 6 questions on the bottom of the page
garik1379 [7]

Ivan rigney

John benson      2

Mark nicholls      4

James  mitchell   7

Paul matthews   13

Neil hooper         8

5 0
3 years ago
Your new home has a vacuum system. what kind of computer is controlling it?
Scrat [10]
The answer is embedded computer. It is a PC framework with a committed capacity inside a bigger mechanical or electrical framework, frequently with ongoing figuring constraints. It is implanted as a component of a total gadget regularly including equipment and mechanical parts. Installed frameworks control numerous gadgets in like manner utilize today.
6 0
4 years ago
In computing, a(n) _____ is an attack on an information system that takes advantage of a particular system vulnerability. Select
tensa zangetsu [6.8K]

Answer: d) Exploit

Explanation: Exploit is a type computer attack that successful when the computer system of an user is vulnerable and attacker can do the exploitation. This happens due to the weakness of the system, applications software, network etc.

Other given option are incorrect because exit door,glitch and bad are not any type of attack in the computer field that causes harm to the system.Thus the correct option is option(d).

4 0
3 years ago
What special skill does a developer need to thelp produce timely solutions for users
Gnom [1K]
All we need is Faith, Trust, and Pixie Dust...
4 0
3 years ago
Other questions:
  • 50 pts
    12·2 answers
  • Harry wants to change the background of all of his presentation slides. Which slide will enable him to make this change to all t
    14·1 answer
  • Write qbasic code for given pattern<br><br>NEPAL<br>. EPA<br>. P​
    12·1 answer
  • Help me please............
    6·2 answers
  • Please write down a java program for below instruction.Min-Heap: Construct a Min_Heap from the following set of integers. Rememb
    5·1 answer
  • The premise of this exam is to synthesize your knowledge and understanding of recursion. Your synthesize may be in the form of a
    14·1 answer
  • If you could pick xbox or playstation what would you pick?And why :)?
    11·2 answers
  • Write a program that prints the numbers 1 - 50. If the number is even print the word 'EVEN!' next to it. If the number is odd pr
    10·1 answer
  • Please help me I need a help
    13·1 answer
  • What was the name of the first computer, developed by charles babbage?.
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!