1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irga5000 [103]
3 years ago
13

In 1-2 sentences, describe some keyboard shortcuts you have used during this lesson to save you time.

Computers and Technology
2 answers:
alisha [4.7K]3 years ago
6 0

Answer:

uhhhh

Explanation:

Aneli [31]3 years ago
5 0
Command C command V command A
You might be interested in
Question 1:
RideAnS [48]

Answer:

1. A

2. B

3. C

hope this helps in some way

6 0
3 years ago
What aspect do you need to keep in mind when you add images in a word document?
Trava [24]

While adding images in word you cant do anything with the picture unless you add Wrap text. Usually the wrap text icon is always beside the pic or you can go to Layout or format and select from there. If you're adding a photo between an article, position  works well. You can change the wrap text and position choices according to your needs.

Hope this helps, Please mark as brainliest

5 0
3 years ago
Read 2 more answers
What factor(s) should be considered when determining whether a business is too far based on the query and the user location? Sel
polet [3.4K]

Answer:

Type of Business/entity and User Location are True.

User Intent and your judgment are False.

Explanation:

The following are the factors that treated at the time of deciding the following business is based on the too far query and the location of the user. So, That's why the first two factors are applied by the type of business or entity and the location of the user but the last two factors are not applied because it is not about the user, it is related to the firm or the business.

7 0
3 years ago
1. What are the biggest risks when using the public Internet as a Wide Area Network (WAN) or transport for remote access to your
enyata [817]

Answer:

The problems or risk when using a WiFi is that, hackers often have the ability to position themselves between the user and the end point connection. and once these hackers gains access to your information and privacy, u might lose important documents or contents.

It is of utmost importance that when an end user is using a public WiFi as a WAN, he/she must ensure to browse with VPN turned on, and the sharing options turned off.

Explanation:

Solution

One of the biggest risk with public WiFi is the ability or capacity for hackers to position themselves between you (user) and the point of connection. so instead of communicating directly with the hotpot, at several times you end up sending your information to the hacker.

The hacker also have access or privileges to every information you send out such as credit card information, emails and so on. once the hacker gains access to that information, you run into trouble.

As an end user when making use of public WiFi to ensure to browse with VPN (Virtual private Network) on and turned off sharing options

4 0
3 years ago
Jonathan is eight years old and is a participant in a study assessing the eating habits of schoolchildren. To assess the childre
Law Incorporation [45]

Answer:

"The research team is taking measurements of Jonathan's height and weight to assess his growth"

Explanation:

Anthropometric data refers to a mass of collected information regarding an individual's different measurements such as height, weight, BMI, etc. Therefore the best way to explain this data collection method to the parents in this scenario would be to say that "The research team is taking measurements of Jonathan's height and weight to assess his growth"

7 0
4 years ago
Other questions:
  • Write a multithreaded program that generates the Fibonacci series using Pthreads thread library. This program should work as fol
    10·1 answer
  • The __________ format is a proprietary file format defined by guidance software for use in its forensic tool to store hard drive
    15·1 answer
  • Assume that price is an integer variable whose value is the price (in US currency) in cents of an item. Write a statement that p
    8·1 answer
  • Stella is surfing the Internet to look for affordable apartments in New York City. Every time she clicks on a link to a webpage,
    9·1 answer
  • Help me
    14·1 answer
  • Microsoft Windows is the least used operating system. TRUE or FALSE.
    13·1 answer
  • (main.c File)
    7·1 answer
  • A qué escala está dibujado el plano del Instituto si sabemos que la puerta principal de entrada tiene un ancho 3,40 metros y en
    14·1 answer
  • Mhairi believes that if a site’s information is detailed enough, it is more likely to be true. Is she correct? Answers
    14·2 answers
  • What is the best description of an unbound control?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!