1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pshichka [43]
3 years ago
8

Mariel types a sentence. She then decides to include that sentence four more times. She then decides she only wants the sentence

three more times, but changes her mind again to include the last sentence. Which commands could have been used by Mariel? Check all that apply. More Symbols Insert Symbol Undo Redo Repeat
Computers and Technology
2 answers:
Minchanka [31]3 years ago
8 0
CTRL Z and CTRL Y
(undo)_____(redo)
Westkost [7]3 years ago
7 0

Answer and Explanation

Mariel types a sentence. She then decides to include that sentence four more times

He/she used CTRL+C  which is a computer command which is used to copy a highlighted text to a clipboard. It is generated by pressing the C key while holding down the Ctrl key on most computer keyboard. To include it for more times he/she has to use a command to paste which is CTRL+V this command helps to paste the contents of the clipboard into the current cursor location.

She then decides she only wants the sentence three more times, but changes her mind again to include the last sentence.Here she will use the CTRL+Z which  is a command used to redo and CTRL+Y.

You might be interested in
who thinks homework is anoyying? (freddy randomly started thinking scince he was the leader he caould start acting like a teache
Anuta_ua [19.1K]
I do , homework is so annoying , I hate it
3 0
3 years ago
Read 2 more answers
Order the following routine maintenance tasks from most to least important when securing a computer. a. Verify anti-malware sett
spin [16.1K]

Answer:

The following are the order of the routine maintenance tasks that is C, A, B, D

Explanation:

For securing the computer system the user has to follow some steps related to the routine maintenance tasks.

  • Firstly, the user has to validate the settings on the Windows Update.
  • Then, they have to validate the settings on the anti-malware software.
  • Then, the user has to validate the setting related to the file-sharing system.
  • Finally, they have to validate the frequent optimization of hard drives or hard disks.
7 0
3 years ago
Mail merge documents use ______ to represent personal information that stored in a table.
Mice21 [21]
Mandatory
Mark brainliest please
6 0
3 years ago
In multi-grade oil what is W means?
Simora [160]

Answer:

winter viscosity grades

Explanation:

6 0
3 years ago
In the context of firewall as a nonbiometric security measure, a _____ is software that acts as an intermediary between two syst
irga5000 [103]

Answer:

Proxy Server                        

Explanation:

  • Proxy server is a server that acts as a mediator between two systems.
  • One system can be your computer and the other can be the server to which you are asking a service, such as requesting a web page.
  • Lets suppose you request a web page from a server and you type a URL of a website to access a web page.
  • This request goes to proxy server which sends this request on your behalf to the target server in order to retrieve that web page.
  • Proxy server makes this request to the target server on the internet by using one of its IP addresses.
  • When the proxy server gets that web page, it will forward that web page to your requesting computer.
  • If you request a specific service such as a website frequently the proxy server saves that website on its cache.
  • So if you request that website again, proxy server will forward it to you from its cache rather than requesting it again from the target server on your behalf resulting in quick response to the user's request.
  • Proxy servers provide users with privacy to access the websites, and they can surf the internet anonymously .
8 0
3 years ago
Other questions:
  • Where is the typical location of a touchpad inside of a laptop?
    14·1 answer
  • ____ takes the idea of breaking down a program into separate and reusable functions to the next level by focusing on the encapsu
    10·1 answer
  • Describe network in the terms of computer lab
    5·1 answer
  • A user can easily move to the end of a document by pressing the _____ key combination.
    10·2 answers
  • area of trapezium is 54cmsq if parallel sides are 10cm and 8cm long find the distance between the parallel sides​
    12·1 answer
  • Puede existir la tecnologia sin la ciencia y sin las tecnicas,explique si o no y fundamente el porque de su respuesta
    11·1 answer
  • Discuss the factors which cause imbalance in the environment.
    8·1 answer
  • How to enhance the video to full screen in filmora
    15·1 answer
  • When you _______ the top row or the left column, you can keep column headings and row labels visible as you scroll through your
    8·1 answer
  • Which of the following terms refers to the area of the hard drive used for virtual memory?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!