1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xeze [42]
3 years ago
15

What keyboard functions lets you delete words

Computers and Technology
2 answers:
luda_lava [24]3 years ago
5 0

Answer:Backspace

Explanation:

If you want to delete words you use the backspace button.

natima [27]3 years ago
3 0

Answer:

Backspace

Explanation:

You might be interested in
A computer may keep freezing if it's software is up-to-date? <br> True <br> False
tester [92]

Answer:

false

Explanation:

6 0
4 years ago
In the 2007/2010 version of Paint, which of the following tools are located in the View tab? (Select all that apply.)
zaharov [31]
The answers are full screen and gridlines.
7 0
4 years ago
Describe a real or made up but possible example of a product that went through a time of scarcity. What was likely to happen to
NeX [460]

Last 2012, there was a virus which infected millions of chicken. It was known as Avian influenza or bird flu. It resulted to scarcity of eggs. As the law of supply and demand states, there is an effect on the price of a product depending on its availability. If there is a low supply and a high demand, there is an increase in price and vice versa. 

4 0
3 years ago
It is considered good practice to save a presentation before printing it. true false
Ilya [14]
It is true because it is really a good practise to save a presentation before printing it

5 0
3 years ago
Explain 3 ways you can be an upstander when seeing cyberbullying.
Bess [88]

Answer:

Assuming an upstander is someone that opposes cyberbullying:

(1) Call them out

(2) Report the behavior to proper moderation authority

(3) Tell the person to block messages from the cyberbully

I don't really know what else you want from this.

Cheers.

3 0
3 years ago
Read 2 more answers
Other questions:
  • Mike wants to build an amplifier. Which technology can he use?
    15·1 answer
  • \Read the sentence.
    12·1 answer
  • What do computer viruses eat for snacks?
    7·2 answers
  • How do you make your graphics ADA accessible in BlueGriffon?
    12·2 answers
  • Why is investing in a mutual fund less risky than investing in a particular company's stock? A. Mutual funds only invest in blue
    14·2 answers
  • Although the traditional model of software acquisition still accounts for more software acquisition, a new model, called _______
    7·1 answer
  • 8. How can you prevent your VMs receiving DHCP server messages from unauthorized virtual machine pretending to be DHCP servers?
    6·1 answer
  • import java.util.Scanner; public class TeenagerDetector { public static void main (String [] args) { Scanner scnr = new Scanner(
    6·2 answers
  • What are the characteristics of calendar sharing options in Outlook 2016? Check all that apply.
    13·2 answers
  • Write a one register parameter procedure that converts an ASCII digit in AL to its corresponding binary value. If AL already con
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!