1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
san4es73 [151]
3 years ago
11

Which key or button will you use if you accidentally erased a line while typing a paragraph

Computers and Technology
2 answers:
GenaCL600 [577]3 years ago
8 0

Ctrl+Z will undo whatever step you did last, including erasing something. :)

Viktor [21]3 years ago
5 0

you would use the undo button

You might be interested in
The purpose of maintaining a network of digital forensics specialists is to develop a list of colleagues who specialize in areas
Rudiy27

Answer:

True

Explanation:

Computer security is basically divided into three main areas:

  1. Vulnerability/threat assessment and risk management refers to a process that requires the identification, quantification and ranking of a system's possible vulnerabilities.
  2. network intrusion detection and incident response refers to software that detects malicious activity or policy violations, and blocks them
  3. digital forensic investigation refers to the process of identifying, recovering and interpreting (or validating) electronic data.

Generally a single individual may specialize in one of these areas, that is why he/she may need help with the others.

8 0
4 years ago
Read 2 more answers
HELP I WILL GIVVE BRAINLY AND 15 POINTS
levacccp [35]

Answer:

Because someone was hittting the space bar in the message instead of typing letters and numbers

Explanation:

Because they were bored or it was a glitch

4 0
3 years ago
__________is threatening to steal or actually stealing information from a company and then demanding payment to not use or relea
Ludmilka [50]

Answer: 3) Information extortion

Explanation:

Information extortion is defined as the technique through which a person tends to steal and hold the confidential and important information with theirself and then demand ransom for returning it.

  • Releasing information to corrupt and attacking sources can be a consequence if the demand or condition is not fulfilled by the authorized party or person.
  • Other options are incorrect because espionage is spying military information.Competitive intelligence is used for managing strategic plans.Intellectual property is created through mind power.
  • Thus, the correct option is option(3).
5 0
3 years ago
________ is installed on your computer, and when the program is opened, your e-mail downloads to your computer.
kenny6666 [7]
An email client is installed, like Microsoft Outlook for example.
4 0
3 years ago
Read 2 more answers
What defines which part of the IP address is the Network ID and the Host ID?
Brilliant_brown [7]

Answer:

Subnet Mask

Explanation:

Literally the answer.

5 0
3 years ago
Read 2 more answers
Other questions:
  • Having reviewed dod wireless stig (ver6, release 1), sarah learns she may only utilize secnet 54 and ______________ for transmit
    13·1 answer
  • >>> import math >>> print(math.Pi) 3.141592653589793 >>> def print_volume(): print ("What is the radi
    12·1 answer
  • Which devices typically generate computer output ?
    8·2 answers
  • What is qwerty and why is it on the keyboard?
    15·2 answers
  • Which elements of text can be changed using automatic formatting? Check all that apply.
    8·1 answer
  • 8.11 LAB: Filter and sort a list
    8·1 answer
  • What is considered appropriate dress for men and women in the workplace? Select all that apply.
    6·2 answers
  • Create a program that allows the user to pick and enter a low and a high number. Your program should generate 10 random numbers
    14·1 answer
  • Explain how communication has helped to the staff in organization to reach their maximum delivery of service with efficience and
    11·1 answer
  • Yeoo check dis out!!!!!! wait my full vid dont show hol on
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!