1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Salsk061 [2.6K]
3 years ago
12

How do you copy and paste a screenshot on an hd computer

Computers and Technology
2 answers:
Natali5045456 [20]3 years ago
8 0
I usually do Alt+ prtsc
ICE Princess25 [194]3 years ago
6 0

Answer:

Ctrl shift s, i believe

You might be interested in
In the language of the World Wide Web, "this page cannot be displayed" means A. your computer's software is damaged. B. the ISP
asambeis [7]
The answer is d. most definitely <span />
7 0
3 years ago
Read 2 more answers
You have recently compiled a custom Linux kernel. You notice some performance issues with and need to use the kernel log files t
Alex17521 [72]

The command you should use to view the kernel log files is dmesg. This command prints out the kernel log messages, which can provide useful information in troubleshooting performance issues.

<h3>Troubleshooting Performance Issues Using Linux Kernel Log Files</h3>

The Linux kernel is the core of any Linux-based operating system and is responsible for managing system resources and providing a platform for applications to run. This makes it essential to have a reliable kernel. However, like any complex system, sometimes there are performance issues that need to be troubleshooted. In such cases, kernel log files can help provide valuable insight into the problem.

Kernel log files are the records of the kernel's activities. They provide detailed information about the system, including system errors, warnings, and other important events. This allows for detailed analysis of the system and can help pinpoint the source of any performance issues.

Learn more about systems :

brainly.com/question/14688347

#SPJ4

3 0
11 months ago
How does a cell phone change the<br> incoming signals from a caller into sound that<br> you can hear
shtirl [24]

Answer:

they send electrical signals to the buzzer. The buzzer changes those electrical signals into sound. You hear the buzzer sound and know that someone is calling you.

Explanation:

8 0
2 years ago
Read 2 more answers
The BaseballPlayer class stores the number of hits and the number of at-bats a player has. You will complete this class by writi
atroni [7]

Answer:

class BaseballPlayer {

 private int hits;

 private int atBats;

 private String name;

 public BaseballPlayer(String n,int h,int a) {

   name=n;

   hits=h;

   atBats=a;

 }

 public void printBattingAverage() {

   double battingAverage = hits / (double)atBats;

   System.out.println(battingAverage);

 }

 public String toString() {

   return name + ": "+hits+"/"+atBats;

 }

}

public class Baseballtester{

 public static void main(String[] args){

   BaseballPlayer babeRuth = new BaseballPlayer("Babe Ruth", 2873, 8399);

   System.out.println(babeRuth);

   babeRuth.printBattlingAverage();

 }

}

Explanation:

The BaseballPlayer class is used to get and hold data of an instance of a baseball player. the instance object holds the name, number of hits and bats of the player.

The constructor is used to initialize the name, hits and atBats variables of an instance. The "printBattlingAverage" method returns the ratio of the hits and atBat variable while the string method "toString" returns the name and the hits to atBats ratio in string format.

7 0
3 years ago
Which of the following is true about parallel computing performance?
Ierofanga [76]

Answer:

Computations use multiple processors. There is an increase in speed.

Explanation:

The increase in speed is loosely tied to the number of processor or computers used.

Mark me a brainliest answer

4 0
3 years ago
Other questions:
  • How has technology affected the way that you produce art like photographs?
    8·1 answer
  • The computer mouse is used to
    7·1 answer
  • An information security ________ is a specification of a model to be followed during the design, selection, and initial and ongo
    11·2 answers
  • The three tasks within data harmonization, namely: data consolidation, data cleansing, and data formatting use techniques called
    8·1 answer
  • Which industry has the highest employment figure for both teen and young adults in July, 2014?
    6·1 answer
  • How long does it take to be placed in a class on flvs?
    14·1 answer
  • Which device makes computers that are connected to separate segments appear and behave as if they're on the same segment? (Pleas
    11·1 answer
  • Write a pseudo-code that keeps asking the user for a given number 'n' different of zero, then print all numbers between one &amp
    8·1 answer
  • Old systems can be useful when designing new computer software.<br> True or False
    7·2 answers
  • ________ helps in determining the cause of a security threat in an incident response plan. Question 7 options: A) Restricting sy
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!