1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
puteri [66]
3 years ago
11

Find four different commands in Internet Explorer and identify their keyboard shortcuts.

Computers and Technology
1 answer:
Sauron [17]3 years ago
5 0
So here are four:
1. ALT+D--Select text (while working in the address bar)
2. CTRL+V--Paste copied text 
3. ESC--Stop downloading a webpage
4. CTRL+D--Add your current page to favorites 
Hope I helped!! :)
You might be interested in
Prompt
madam [21]

Have you ever tried to learn a new language or do you have friends who've had that experience?

Yes, I tried to learn Python and I even managed to do two Discord bots which are (somewhat) functional, but I'm far to say that I've managed to lean the language completly. There are lots of things to learn on a language as Python.

I also leant PHP on my own and managed to do a website (somehow) functional.

What are some of the  steps you would take to learn a new language, and what are some challenges that might arise?

The first steps in learning any computer language is learning the syntax. If you manage to do that, with the experience you gained from previous projects/languages you might be able to create something working. At times you might feel down if the project doesn't work as expected.

What are some things that  can help make the process easier?

Video tutorials, experiments and searching questions and problems on Google is a very important resource.

3 0
3 years ago
Explain the third <br> generation
meriva
Computers were computers that emerged due to the development of the integrated circuit.
8 0
3 years ago
Difference between volatile and non volatile memory
slega [8]
<span>Volatile memory requires electricity or some kind of current to store information, and nonvolatile memory does not.</span>
6 0
3 years ago
Read 2 more answers
When water reaches the pole, most of it turns to ice. Some salt is trapped between ice crystals, but most is left behind in the
astra-53 [7]

Answer:

b should be the right answer

Explanation:

8 0
3 years ago
Read 2 more answers
The IP protocol (and UDP) are called "connectionless" and "unreliable." Describe what those two words mean in the context of dat
igor_vitrenko [27]

Answer:

Explanation:

In data communications, a protocol is <em>connectionless </em>if it describes communication between two devices in a network without first establishing or verifying establishment of some link (connection) between the two devices. In a connectionless protocol, data are exchanged between processes or devices without a prior check of whether the processes are ready to transmit data or not. In this type of protocol, there's no verification put in place to remember if these processes were or are in communication. Connectionless protocols are also called stateless protocols. Because connectionless protocol cannot be relied upon due to its lack of delivery-assurance policy, it is sometimes referred to as <em>unreliable protocol</em>. In other words, delivery of data packets is not guaranteed. An example of a connectionless protocol is the UDP (User Datagram Protocol).

However, if the protocol defines some checks to ascertain that there is first a connection between two communicating processes before beginning transmission, then, the protocol is <em>connection-oriented. </em>An example of this is the TCP (Transmission Control Protocol). Connection-oriented protocols are reliable since they ensure connection be made between processes before transmitting data packets.

A typical application of a connectionless/unreliable protocol is in the streaming of real time videos or voice communication where packets of data could be dropped and not resent.

An example of the connection-oriented/reliable protocol is analogous to making a telephone call where data packets (voice messages) are not sent until the receiver on the other end makes a connection.

6 0
3 years ago
Other questions:
  • Human-centered technology often recommends _______ao
    13·2 answers
  • Changing the color of my avatar using a computer program is ok since it doesn't impact anyone else
    12·1 answer
  • As a graphic designer, you'll refer to a line as which of the following? A. Point B. Border C. Rule D. Frame
    9·2 answers
  • 4. What are five actions you should do to care for your camera?
    15·1 answer
  • The hardware to keep the output data when finished is a
    9·1 answer
  • Write a Python program to balance a checkbook. The main function needs to get the initial balance, the amounts of deposits, and
    5·1 answer
  • To exclude members of a group from the basic permissions for a folder, which type of permission would you assign? Deny Allow Mod
    13·1 answer
  • Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in
    9·1 answer
  • Good HTML skills will be required in order to prevent what from happening in the design of a web page?
    7·1 answer
  • 1. It manages the computer's memory and processes, as well as all of its software and hardware.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!