1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kkurt [141]
3 years ago
7

You can select slide objects in order to delete them simultaneously by pressing the _____ key as you click each object. select o

ne:
a. shift
b. ctrl
c. alt
d. tab
Computers and Technology
2 answers:
HACTEHA [7]3 years ago
6 0
D tab that is the key you would need to use in order to do that
Vesna [10]3 years ago
4 0
The best answer is alt
You might be interested in
What is the value of the result after the following statement is executed? int result = 2 + 3 + 4 ;
kow [346]

2 + 3 + 4 = 9 so the value of result is also 9

8 0
3 years ago
“If the information ______________________, then that information (should / should not) be stored because _____________. For exa
lisov135 [29]

The blanks spaces are filled with the following;

  1. Is confidential, should not
  2. There's risk of information theft on the cloud
  3. Social security number, should not

<h3>Confidential information and the storage cloud</h3>

According to McGinley, in some cases, storing any type of personal information for one's self or one's customers in the cloud would be a mistake. Information relating to date of birth, Social Security number, passport numbers should not be kept in the cloud.

This follows from the fact that "Cloud providers are no less bulletproof than any of the other previous industry."

Read more on information storage;

brainly.com/question/24688176

5 0
3 years ago
type the correct answer in the Box spell the words correctly Caleb is working on a simple logic base program to stimulate the ga
ycow [4]

Answer:incomplete question

Explanation:

4 0
3 years ago
Read 2 more answers
Janeal spends her day looking at the stock and bond markets and evaluating how the portfolios of the businesses she serves will
pychu [463]

Answer:

ur answer good sir will be : financial analyst

and a brainliest will be good to thnx

4 0
4 years ago
Social engineering attacks can be carried out:______.
Alik [6]
The answer most likely B NOT SURE )
3 0
3 years ago
Other questions:
  • How to check the balance on a visa gift card?
    6·1 answer
  • ___________ is an unsecured client server application / protocol that transfers files between two computers.
    11·1 answer
  • Technician A says a 2:1 gear ratio doubles the amount of torque. Technician B says a 2:1 gear ratio reduces the speed by half. W
    8·1 answer
  • Write a method that returns a new array by eliminating the duplicate values in the array using the following method header: Publ
    6·1 answer
  • Which of the following should be performed to prove the value of a security awareness training program?
    8·1 answer
  • If anyone wants to ft heres the link
    6·1 answer
  • Please Complete in Java a. Create a class named Book that has 5 fields variables: a stock number, author, title, price, and numb
    10·1 answer
  • A(n) ________ address is the address that external entities use when communicating with your network.
    11·1 answer
  • Components of document merging?
    5·1 answer
  • Which instructions are used to change the sequence of instruction execution? group of answer choices data movement operate contr
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!