1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valentinak56 [21]
3 years ago
6

What shortcut keys do i use to print something on my keyboard ?

Computers and Technology
2 answers:
gogolik [260]3 years ago
8 0
Hi There!

You might want to consider CTRL+P to help you print!

Hope This Helps!
romanna [79]3 years ago
5 0
CTRL+P. It's usually pressed when you want to print something.
You might be interested in
explain why the database system would not allow a tuple to be inserted into the database through this view
Andrej [43]
For the view of Exercise 4.18, explain why the database system would not allow a tuple to be inserted into the database through this view.
For reference
For the database of Figure 4.12, write a query to find the ID of each employee with no manager. Note that an employee may simply have no manager listed or may have a null manager. Write your query using an outer join and then write it again using no outer join at all.
OUTER JOIN
select e.ID from employee e left outer join manages m on e.ID = m.ID
where m.manager_id is null;
NO OUTER
select e.ID from employee e where e.ID not in (select m.ID from manages m) or e.ID in (select m.ID from manages m where m.manager_id is null);
6 0
2 years ago
A(n) ____ is an attack that takes advantage of a system vulnerability.
jarptica [38.1K]
<span>Exploit -</span> An attack that takes advantage of a system vulnerability, often<span> due to a combination of one or more improperly configured services.</span>
8 0
3 years ago
PLEASE HELP!!!!!!!!!!!
Dafna1 [17]
I'd say Davis was trying to increase persuasive power. Given that he saw that nobody was really his friend because he was shy and quiet, he tried to persuade people to like him by going to the game and hanging out with people. 
4 0
3 years ago
Read 2 more answers
2. Read the following scenarios about how three different programmera approach
zheka24 [161]

Answer: A or B

Explanation: I think it's A or B Because they are the ones that make more sence

4 0
2 years ago
Read 2 more answers
Which of the following statements is true about mobile devices and procedures?
Zarrin [17]

Answer:

No

Explanation:

No

5 0
3 years ago
Other questions:
  • If it can be applied, the least-damaging recovery option is ________.
    10·1 answer
  • What does pagination mean in Microsoft Word?
    10·2 answers
  • A network engineer is examining a configuration implemented by a new intern who attached an ip phone to a switch port and config
    9·1 answer
  • Why is it important to use standard english when applying for a job
    13·2 answers
  • To copy text in a Word document to an Excel spreadsheet, you should first format the text as a Word table or as text separated b
    11·2 answers
  • According to the video, what qualities do Human Services workers need? Check all that apply.
    11·2 answers
  • For Excel:
    5·1 answer
  • The velocity dimension of Big Data refers to _____.
    15·1 answer
  • When one loop appears inside another, the loop that contains the other loop is called the ____ loop. Group of answer choices ind
    15·1 answer
  • Answer the following question in 3-4 complete sentences. Define the following terms: - registration - press - keyblock.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!