1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alekssr [168]
3 years ago
15

You want to send an email message to your friend to describe your meeting with Michal. However, you incorrectly type the name as

Michael.
Where will you place the insertion point if you want to use the Delete key to remove the letter 'e' in the name Michael?

A. After the letter l
B. Before the letter e
C. After the letter e
D. Before the letter l
Computers and Technology
1 answer:
Gemiola [76]3 years ago
4 0

Answer:

Option B.

Explanation:

The delete key is used to delete the symbol after the insertion point.

Here, Michal is typed as Michael.

So, to delete the letter e from Michael, put the insertion point before e.

If you put insertion point after the letter e or before the letter l, l gets deleted.

In no case, you can put the insertion point after the letter l.

So, option B is correct.

You might be interested in
What are examples of some Exotic currencies?
Grace [21]

Answer:

D.

Explanation:

An exotic currency pair is the pair of currencies of a major countries with those markets that are emerging or developing. Such currency pairs are seldomly used as it lacks market depth, added to it, it also contain the possibility of unfair treatment or partial treatment.

<u>Some example of exotic currency pair includes EUR/TRY (Euro and Turkish Lira), AUD/CAD (Australian Dollar and Canadian Dollar), etc.</u>

The example of Exotic currencies from the given options are MXN (Mexican Peso), ZAR (South African Rand), and HKD (Hong Kong Dollar).

Thus the correct option is D.

5 0
3 years ago
Which protocol is often used in conjunction with ipsec to provide a remote access client vpn with user authentication?
amid [387]

The L2TP or Layer 2 Tunneling Protocol is often used in conjunction with ipsec to provide a remote access client vpn with user authentication.

<h3>What is vpn?</h3>

VPN is known as a Virtual Private Network extends a private network across a public network and activates users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

The main difference between VPN proxy and a VPN is encryption and VPNs hides all the web activities performed by the user as well as user's private IP address.

Therefore, the L2TP or Layer 2 Tunneling Protocol is often used in conjunction with ipsec to provide a remote access client vpn with user authentication.

Learn more about VPN here:

brainly.com/question/17272592

#SPJ4

3 0
2 years ago
Pick 2 different operating systems and discuss how they can be used in daily operations.
Scilla [17]

Two different Operating Systems are

Windows 7

LINUX

Explanation:

  • Windows is an Operating System which was released by Microsoft to be used on Personal Computers.
  • They are used to manage software and perform various tasks.
  • LINUX is another type of operating system that is used on Super computers
  • Linux has been used in homes and organisation desktops in a great number.
  • It is used for great number of computing embedded tasks.
6 0
3 years ago
Which best describes what databases do?
quester [9]

Answer:

They create categories for data.

Explanation:

They can create categories for data, by storing the data. Information itself can be stored in multiple ways, like creating categories!

I hope this helped :)

6 0
3 years ago
Read 2 more answers
Which storage device would you most likely use to share a file with a classmate?
valina [46]
You’d probably use a USB Flash Drive.
6 0
4 years ago
Read 2 more answers
Other questions:
  • An employee who interacts with customers regarding the nature of their car problems, rather than actually working on the vehicle
    12·2 answers
  • Mathematical expression that might link numbers in cells
    14·1 answer
  • Where could an identity theft access your personal information?
    9·2 answers
  • Project using simple formulas
    15·1 answer
  • Which of these trade-offs occur in a memory hierarchy?
    15·1 answer
  • Write a program that defines an array of integers and a pointer to an integer. Make the pointer point to the beginning of the ar
    12·1 answer
  • Which of the following screen elements is a horizontal bar that displays at the
    8·1 answer
  • what is the term for software that is exclusively controlled by a company, and cannot be used or modified without permission?
    6·1 answer
  • 100 POINTS!!!!!!!!
    6·2 answers
  • Given a number n, for each integer i in the range from 1 to n inclusive, print one value per line as follows:
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!