1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xeze [42]
3 years ago
15

What keyboard functions lets you delete words

Computers and Technology
2 answers:
luda_lava [24]3 years ago
5 0

Answer:Backspace

Explanation:

If you want to delete words you use the backspace button.

natima [27]3 years ago
3 0

Answer:

Backspace

Explanation:

You might be interested in
The layout button is located in the ____ group on the home tab?
omeli [17]
It is located on the view group on the home tab
5 0
3 years ago
_________________________ are the countable products resulting from a program, while ________________________ are the changes in
garik1379 [7]

Answer: Outputs; Outcomes.

Explanation:

Program refers to the collection of instructions which the computer can execute in order to perform a certain task.

Outputs are are the countable products resulting from a program, while on the other hand, outcomes are the changes in clients that are achieved as a result of program participation.

8 0
3 years ago
The first character of the VIN designates which of the following? 
Dennis_Churaev [7]

country or origin is usually the first character of a vin #

7 0
4 years ago
Read 2 more answers
Who is katie and why is she deleting my answers
defon

Answer:

fr its so annoying when they delete your stuff when there is legit nothing wrong with the question

Explanation:

8 0
2 years ago
Read 2 more answers
What kind of server connects a remote system through the internet to local serial ports using tcp/ip?
zaharov [31]
A proxy server. A system requests information from the internet, and that traffic is routed through the proxy server before arriving to the requesting system.

This is why proxy servers are used for hiding identity and being more secure, as internet traffic would show the IP address of the proxy server, and not the requesting system, though this often depends on the type of proxy server, as some proxy server's main objective isn't anonymousity, but rather efficiency.
4 0
3 years ago
Other questions:
  • You can access decorative underlines and change their color through the ____ drop-down.
    8·1 answer
  • You're creating a table for one of your slides, and need to make some modifications to your table structure. Which of the follow
    14·1 answer
  • Instructions:Type the correct answer in the box. Spell all words correctly.
    14·2 answers
  • web pages within the same website often have different blank because they have different blank A) home pages, urls B) goals, sou
    12·1 answer
  • What connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to acknowledge that the
    5·2 answers
  • This is 6th grade career class.
    10·1 answer
  • What feature allows you to access previous copies of a document on OneDrive?
    15·2 answers
  • Which of the following is not a data visualization technique?
    6·1 answer
  • What are the main types of database end users,? Discuss the main activi-ties of each
    10·1 answer
  • PLEASE HELP
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!