1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MissTica
3 years ago
15

When you type the wrong character, you can press the ____ key to erase all the characters back to and including the one that is

incorrect.?
Computers and Technology
1 answer:
Elanso [62]3 years ago
4 0
Backspace key........
You might be interested in
Refer to the image of the Cornell method, then use the drop-down menus to complete each statement. Number 1 should be . Number 2
kifflom [539]

Answer:

e

Explanation:

6 0
3 years ago
Read 2 more answers
var shirt = "blue"; 2. var pants = "gray"; 3. var clothes = wearIt(shirt, pants); 4. function wearIt( x, y) 5. { 6. var myOutfit
pogonyaev

Answer:

Arguments: "blue" and "gray"

Parameters: x and y

Explanation:

In programming, a function can take zero or one or more than one input values. These input value will be held by the variables which are called parameters. In this code snippet, x and y are parameters of wearIt function.

On another hand, when calling a function, we provide the values to the function and the values provided are termed as arguments. In this case, we provide the string blue and gray which are held by shirt and pants variables respectively to the function wearIt. The string "blue" and "gray" will then be passed to parameter x and y which will be processed in the function.  

4 0
4 years ago
Physical security controls traditionally include obstacles, alarms, lights, guards, cameras, and responders that produce a(n) __
Lostsunrise [7]

Answer:

secure facility

Explanation:

7 0
3 years ago
What is IBM compadibles
mixer [17]

Answer:

IBM PC compatible computers are computers similar to the original IBM PC, XT, and AT that are able to use the same software and expansion cards. Such computers were referred to as PC clones, or IBM clones

8 0
4 years ago
Six causes of data lost
Colt1911 [192]
What is the question here?
4 0
4 years ago
Other questions:
  • Longer speeches should be separated into the paragraphs of:
    9·1 answer
  • What are vertical sets of cells called
    5·2 answers
  • A series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks
    11·2 answers
  • A result of the Gibbons v. Ogden (1824) decision was that states​
    11·1 answer
  • What is likely to happen to the economy when there’s too much money or credit circulating?
    13·1 answer
  • The statement x++;
    11·1 answer
  • What is bigger 4 liters or one gallon
    13·1 answer
  • Can someone please help me
    15·1 answer
  • What are programs that are installed without the user knowing
    7·1 answer
  • What computing paradigm can solve a problem by describing the requirements, without writing code in a step-wise fashion to solve
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!