1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
san4es73 [151]
2 years ago
11

Which key or button will you use if you accidentally erased a line while typing a paragraph

Computers and Technology
2 answers:
GenaCL600 [577]2 years ago
8 0

Ctrl+Z will undo whatever step you did last, including erasing something. :)

Viktor [21]2 years ago
5 0

you would use the undo button

You might be interested in
Several NEC® sections contain the requirement to size conductors and overcurrent devices at 100 percent of the noncontinuous loa
9966 [12]

Answer:

125 percent of continuous load

Explanation:

8 0
3 years ago
A large number of genetic codes are stored as binary values in a list. Which one of the following conditions must be true in ord
Bad White [126]

Answer:

D

Explanation:

3 0
3 years ago
Read 2 more answers
You are the network administrator for a company with a single Active Directory domain. The corporate office is located in Miami
Lubov Fominskaja [6]

Answer: throw your computer out of the window because to hell with this question

Explanation:

4 0
3 years ago
The IT Department already has been testing Windows Server 2012 R2, and some time ago purchased licenses to convert all of its Wi
Nana76 [90]

Answer:

19

Explanation:

5 0
3 years ago
What are the limits of hashing and verifying that files haven’t changed?
earnstyle [38]

The hashing function can take any number of key-value pairs and there is no specific limit to it.

<h3>What is hashing?</h3>

Hashing is a file-based algorithm for producing a fixed-length bit string value. A file is essentially a collection of data blocks. The length of the data is reduced by hashing to a fixed number or key that represents the original string.

When hashing is employed, the hash function may plot all of the keys and values to what the real size of the table is, demonstrating that the hashing function can take any number of key-value pairs with no restriction.

However, if the passwords are hashed in encryption, recovering the passwords is extremely difficult.

Thus, the hashing function can take any number of key-value pairs and there is no specific limit to it.

Learn more about the hashing here:

brainly.com/question/13106914

#SPJ1

5 0
1 year ago
Other questions:
  • . Write a recursive function names factorial to compute the factorial of the parameter. Also write the main function, where you
    15·1 answer
  • A security policy is a
    11·1 answer
  • You are going to be installing a videoconferencing system. One of the requirements of the system is that only workstations that
    10·1 answer
  • Controlled intersections use some form of which of the following:
    7·1 answer
  • A Raycast returns a float that tells you how far away an Object is
    8·1 answer
  • Where is permanent data in the computer stored whenever gym starts his laptop He sees some commands in numbers appearing on the
    12·1 answer
  • Why is 0.3333333333333333 the output of print(1/6 + 1/6) in python?
    8·1 answer
  • What are 3 examples of a idler gear in real life?
    7·1 answer
  • What are Database administrators? <br> Thank you :)
    7·1 answer
  • When dividing it’s total debt by total equity what’s a company trying to measure
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!