1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alecsey [184]
2 years ago
7

"which key do you hold down to select a group of contiguous files"

Computers and Technology
1 answer:
zloy xaker [14]2 years ago
4 0
The "Ctrl" key is the answer.
You might be interested in
Limitations of systems analysis and design​
Sonja [21]

Answer:

<h3 />

Explanation:

<h3>Although System analysis offers an extensive range of benefits it might also have some disadvantages. One of the main disadvantages which is mostly overlooked is the risk of too much analysing which may be costly and time consuming. It is therefore part of the analyst's job to find the right balance.</h3>
6 0
2 years ago
What is a Windows feature that allows you to temporarily store text?
nata0808 [166]
This would be copy and paste.

When you select a text, you can use your keys CTRL and C to copy that same selected text. After this, you can use the paste feature by selecting CTRL and V. Doing this, your selected text will be copied and pasted to a certain location. 
3 0
3 years ago
How did New York Governor Hugh Carey handle Sostre’s situation?
Ira Lisetskai [31]

Answer:

The governor found a way to free Sostre without assessing whether or not he was guilty or innocent of drug crime in buffalo.

Explanation:

4 0
2 years ago
Read 2 more answers
Alice's Restaurant Supply offers a line of specialty food products to institutional
Illusion [34]

Answer:

1) the wireless standards that can be implemented are; IEEE 802.11a, IEEE 802.11b, IEEE 802.11g and IEEE 802.11n. The pros and cons are in the attachment

2) 802.11g can be implemented in alice's restaurant. This is because it provides the fastest speed and has a wide range which will not be easily disturbed by other devices

3) Please check the attachment

4) Please check the attachment.

Explanation:

3 0
3 years ago
Which statement best describes network security
Andreyy89
<span>B.network security means all personal information is kept safe the network is not compromised and only authorized users had access 

Im pretty sure they ment has instead of had</span><span />
3 0
2 years ago
Read 2 more answers
Other questions:
  • Drag the tiles to the correct boxes to complete the pairs.
    7·2 answers
  • To select all the text in a document, press ____.
    12·2 answers
  • Does any one play sniper clash 3d ??? ​
    9·2 answers
  • In most software packages, the function key F1 is used to run the _____program.
    10·1 answer
  • Someone once observed that "the difference between roles and groups is that a user can shift into and out of roles, whereas that
    13·1 answer
  • How to wire two separate switches &amp; lights using the same power source?
    14·1 answer
  • How do you mark peoples answer as the brainliest answer? I have trouble doing so. Please help!
    10·2 answers
  • Rule number one for handling an emergency is to _____. A. buy a new vehicle B. call law enforcement C. remain calm D. restart th
    6·2 answers
  • Which graphic file format is used for commercial purposes.
    10·1 answer
  • Which item is developed last in the cyclical process?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!