1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Shtirlitz [24]
3 years ago
12

NEEDED ASAP

Computers and Technology
1 answer:
kogti [31]3 years ago
8 0

Explanation:

1. special key combination that causes specific commands to be executed typically shortcut keys combine the ctrl or alt keys with some other keys.

2. 5 example of shortcut keys are:-

  • 1. ctrl + A - select all
  • 2.ctrl + B - bold
  • 3. ctrl + C - copy
  • 4. ctrl + U - under line
  • 5. ctrl + v - paste

3. (i) open the start menu

(ii) open Windows task manager

(iii) close the currently active program

(iv) replace

(v) align center

4. the three importance of shortcut keys are :

  • efficient and time saving :- using shortcut make you more efficient at doing certain task on your computer .
  • multi-tasking :- being a multi Tasker is something required in life.
  • health benefit :- cutting down on your mouse usage by using keyboard shortcut can help reduce the risk of RSI (Repetitive Syndrome Injury).

5. shortcut keys are very helpful because it take less time. keyboard shortcuts are generally used to expedite common operation by reducing input sequence to a few keystrokes.

You might be interested in
This form of analysis is an extension of what-if analysis and is the study of the impact on other variables when one variable is
Elenna [48]

Answer: (C) Sensitivity analysis

Explanation:

 The sensitivity analysis is also known as simulation analysis or "What-if" analysis as, it is basically used for the outcome prediction of the decision making in various range of the given variable.

It is used by making a given arrangement of factors, an investigator can decide that how changing in a single variable influence the final result.

The sensitivity analysis is the process for investigation of how the vulnerability in the yield of a scientific model or framework can be isolated in the system.  

Theretofore, Option (C) is correct as all the other options does not involve in the study of variable and also others are not the extension of what-if analysis.

3 0
4 years ago
How many times is the second for loop going to loop in this block of code? Write your answer in numeric form in the box provided
pantera1 [17]

Explanation:

The second for loop does 1 of 4 iterations for every 1 of 5 iterations of the parent loop. meaning it is 4 x 5 which is 20.

8 0
2 years ago
Tuklasin<br>awain 2: Grapiko ng Pananagutan<br>Isulat sa graphic organizer pa​
mrs_skeptik [129]
What are you saying????
7 0
3 years ago
A picture drawn in 3 d is called?​
Varvara68 [4.7K]

Answer:

autostereogram

Explanation:

that^

6 0
3 years ago
Read 2 more answers
? An attempt to harm damage or cause threat to a system or network is broadly termed as
Radda [10]

Answer:

A cyber attack or hacking

Explanation:

6 0
3 years ago
Other questions:
  • Olivia needs to get permission to use a graph of data gathered by a trade association she plans to include the graph in a report
    10·2 answers
  • Which individual of the following would be most likely to be directly concerned with web security?
    14·2 answers
  • What are the principal cybersecurity threats, both internal and external, and the principal safeguards that have been developed
    13·1 answer
  • What is the importance of different camera angles ?
    9·2 answers
  • How will you identify a file type on your computer?
    5·1 answer
  • Camila wanted to increase the readability of her company newsletter. To do this, she added _____.
    7·2 answers
  • Give me two reasons why return statements are used in code.
    10·2 answers
  • Select the correct answer
    15·1 answer
  • Consider our authentication protocol 4.0, in which Alice authenticates herself to Bob, which we saw works well (i.e., we found n
    15·1 answer
  • Suppose the cache access time is 10ns, main memory access time is 200ns, and the cache hit rate is 90%. Assuming parallel (overl
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!