1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anzhelika [568]
4 years ago
9

Tara needs to select all of the text in a Word document. Which keyboard shortcut will achieve this goal?

Computers and Technology
2 answers:
lubasha [3.4K]4 years ago
7 0

Select text by using the keyboard. Note: To select an entire document, press CTRL+A. Place the insertion point at the beginning of the word, and then press CTRL+SHIFT+RIGHT ARROW. Move the pointer to the end of the word, and then press CTRL+SHIFT+LEFT ARROW.

user100 [1]4 years ago
3 0
Ctrl + a im pretty sure
You might be interested in
What role do visual merchandisers play on the marketing team
almond37 [142]

They are responsible for the total merchandise or service presentation, the overall business/brand image, and even the building and placement of design elements.


8 0
3 years ago
When you write code to count the number of times red is the color, what is the index of "red"?
lorasvet [3.4K]

Answer:

1

Explanation:

Remember it starts with 0. Correct on edge.

7 0
3 years ago
JAVA
Svetach [21]

public class JavaApplication65 {

   

   public static void main(String[] args) {

       for (int i = 1; i <= 50; i++){

           if (i % 2 == 0){

               System.out.println(i);

           }

       }

   }

   

}

I hope this helps!

6 0
3 years ago
Disney's first cartoon
lora16 [44]

Answer:

Mickey Mouse

Explanation:

7 0
3 years ago
Read 2 more answers
Technology is the tool, but without proper IG policies and a culture of compliance that supports the knowledge workers following
choli [55]

Answer:

The answer is letter B. Will fail without user commitment

Explanation:

With an old IT adage in mind, even a perfect IT program<em> Will fail without user commitment. Because the glaring vulnerability in the security architeture of ECM systems is that few protections exist once the information is legitimately accessed. These confidential information  often can be printed, e-mailed, or faxed to unauthorized parties without any security attached.</em>

4 0
4 years ago
Other questions:
  • Which technology from intel combines a processor, chipset, and wireless network adapter into the same unit?
    6·1 answer
  • Which are examples of email client programs?<br> hand<br> are examples of email client programs.
    5·1 answer
  • A telephone repair technician uses a meter to measure voltage on a phone line. This meter is an example of _____.
    10·2 answers
  • Show that, if n is an integer and n^3 + 5 is odd, then n is even, using:
    12·1 answer
  • Write a program that includes functions to calculate feet to inches, inches to feet, feet to yards, and yards to feet. Then, acc
    9·2 answers
  • Int [] val = { 3, 10, 44 };
    13·1 answer
  • How does video conferencing change the way we work today?
    6·1 answer
  • Looking at the response vehicles (pictured above), explain two options you have in order to abide by the Move Over law,
    6·2 answers
  • What data type would you use for a decimal number?* ​
    9·1 answer
  • Which three statements are true of lossless compression?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!