1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pshichka [43]
3 years ago
8

Mariel types a sentence. She then decides to include that sentence four more times. She then decides she only wants the sentence

three more times, but changes her mind again to include the last sentence. Which commands could have been used by Mariel? Check all that apply. More Symbols Insert Symbol Undo Redo Repeat
Computers and Technology
2 answers:
Minchanka [31]3 years ago
8 0
CTRL Z and CTRL Y
(undo)_____(redo)
Westkost [7]3 years ago
7 0

Answer and Explanation

Mariel types a sentence. She then decides to include that sentence four more times

He/she used CTRL+C  which is a computer command which is used to copy a highlighted text to a clipboard. It is generated by pressing the C key while holding down the Ctrl key on most computer keyboard. To include it for more times he/she has to use a command to paste which is CTRL+V this command helps to paste the contents of the clipboard into the current cursor location.

She then decides she only wants the sentence three more times, but changes her mind again to include the last sentence.Here she will use the CTRL+Z which  is a command used to redo and CTRL+Y.

You might be interested in
Companies use virtualization to do all of the following except:
dangina [55]

Answer:

c)

Explanation:

Virtualization refers to running a virtual instance of a computer system apart from the actual software. Companies use this virtualization to do all of the following except Reduce the amount of applications in corporate datacenters. Instead few systems have the applications and those systems are cloned through virtualization.

4 0
3 years ago
All of the following are report sections EXCEPT (Points : 4) detail.
lord [1]

Answer:Summary

Explanation: Summary is the briefing of any information or data and reducing the details about the subject.It is not a part of the report while it is designed because detailing is the part where the description is mentioned with every element so the requirement for summary is in that part and not in the report.

Other option are the part of the report designing because group footer is used for presenting the summaries of group, page footer the area below the main text and detail is the description of every element of the subject.Thus the only exception in the designing of report is summary.

6 0
3 years ago
Which of the following describe the characteristics of a good logo? Choose all that apply. It is a complex design It is memorabl
nasty-shy [4]

Answer:

It is memorable.

It utilizes the elements of design.

Explanation:

IMO these 2 will determine a good logo. Since everyone should remember it if they come across it again in the future

6 0
2 years ago
What is essential for a good study routine? Select four options.
Kipish [7]

Answer:

the answer is having an organized assignment notebook

following a realistic study schedule

realizing when and how long to study

recording due dates and tasks to be done

Explanation:

7 0
3 years ago
In terms of shaping the future of cybersecurity in the United States, how influential do you think the Russian hacking efforts o
Norma-Jean [14]

The influence of the Russian hacking efforts of the 2016 election was known to be greater when compare to things like the Creeper Virus, Morris Worm, or Captain Zap’s hacking of the AT&T online computer system.

<h3>What aspects of this incident could get in the way of the U.S. government responding effectively to the risks the hacking poses?</h3>

The aspect that government that government need to guard against is  stealing of government and business secret as well as people's personal information.

Note that they are a lot of tools that are known to be made up of the National Cybersecurity Protection System such as the EINSTEIN cyber intrusion detection system  and others.

Therefore, The influence of the Russian hacking efforts of the 2016 election was known to be greater when compare to things like the Creeper Virus, Morris Worm, or Captain Zap’s hacking of the AT&amp;T online computer system.

Learn more about Cybersecurity from

brainly.com/question/28004913

#SPJ1

6 0
2 years ago
Other questions:
  • Each peripheral device has its own software, called a(n) ____, which contains the detailed instructions required to start that d
    6·1 answer
  • A(n) _______ gate provides an output of 1 if either or both inputs are 1.
    10·1 answer
  • What OS is most commonly used by businesses?
    11·1 answer
  • Moore’s Law is said to be more of a trend, rather than a representation of the actual number of transistors on a silicon chip. W
    14·1 answer
  • QuickBooks Online (QBCU) Session 4: Post Assessme
    12·1 answer
  • Which step is first in changing the proofing language of an entire document?
    11·1 answer
  • ¡Hola! He visto en muchos comentarios de Twitter "svd" cuando alguien dice "dale fav a este Tweet y siganse entre ustedes" y en
    8·1 answer
  • What number system is the basis for all of the powerful computers and electronic devices in the world?
    7·1 answer
  • Which Excel function or tool will you use to display the cells that are referred to by a formula in the selected cell
    8·1 answer
  • The process of providing only the essentials and hiding the details is known as _____. Group of answer choices algorithm abstrac
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!