1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mazyrski [523]
3 years ago
10

When I press F3, F4, and any of my apps on my mac why wouldn't it do anything? Do you have a way to solve this problem? When I p

ress any app it doesn't do anything and I can only ask Siri to help me go to a certain app but I can't go to all of the apps because Siri will misunderstand me so can you please help me?
Computers and Technology
2 answers:
marissa [1.9K]3 years ago
5 0
If one of your apps require you to use the F keys to access a certain area, try using FN at the bottom left of your keyboard with the f key, so F key + FN
Readme [11.4K]3 years ago
4 0
Press a certain key
You might be interested in
In 2000, operating a basic internet application cost businesses approximately _____ per month. In mid-2016, operating the same a
anyanavicka [17]

Answer:

In 2000, a basic internet application cost businesses approximately $150,000 per month. In mid-2016, operating the same application in Amazon's cloud cost approximately $1,000 per month.

Explanation:

The role of cloud services cannot be overemphasized. Providing Infrastructure as a service (IaaS), Platform as a service (PaaS) and Software as a service (SaaS) cost a lot as there were very few cloud service providers and most services were yet to be integrated to the cloud.

But as at 2016, the cost on applications dropped as we have experienced an exponential growth in cloud services and applications, we now have Internet of Things (IoT) and other cloud infrastructure.

4 0
3 years ago
Older Microsoft disk compression tools, such as DoubleSpace or ____, eliminate only slack disk space between files.
katen-ka-za [31]
I believe the answer is SDelete
6 0
2 years ago
"Describe how implementation of a RAID Level 2 system would be beneficial to a university payroll system. In your own words, des
Darina [25.2K]

Answer:

In RAID 2 Hamming Code ECC Each piece of the information word is kept in touch with an information plate drive . Every datum word has its Hamming Code ECC word recorded on ECC circles. On Read, the ECC code confirms the right information or revises the single plate blunders.  

Strike Level 2 is one of the two innately equal mapping and assurance strategies characterized in the Berkeley paper. It has not been broadly sent in the business to a great extent since it requires an extraordinary plate highlights. Since plate creation volumes decides the cost, it is increasingly practical to utilize standard circles for the RAID frameworks.  

Points of interest: "On the fly" it gives information blunder amendment. Amazingly high information move rates is possible.Higher the information move rate required,better the proportion of information circles to ECC plates. Moderately basic controller configuration contrasted with the other RAID levels 3,4 and 5.  

Impediments: Very high proportion of the ECC plates to information circles with littler word sizes - wasteful. Passage level expense are extremely high - and requires exceptionally high exchange rate prerequisite to legitimize. Exchange rate is equivalent to that of the single plate, best case scenario (with shaft synchronization). No business executions can't/not industrially suitable.

4 0
3 years ago
How can you send and share a message information through a phone​
Snowcat [4.5K]

Answer:

Through text message

Explanation:

Go to messages and select the text you want to share and save it to your clipboard then go to the person you want to send it to then hit the clipboard button and your text will be there.

5 0
2 years ago
Read 2 more answers
A file containing user information which is transmitted from an online server and attached to your web browser and stored on you
rewona [7]
The answer is: <span>Cookie</span>
5 0
2 years ago
Other questions:
  • Sidney works in the accounting department. His boss just assigned him a task that involves creating budget formulas for the comp
    12·1 answer
  • A(n) ____ is a request for specific data from a database.
    9·1 answer
  • WILL UPVOTE ALL plz
    13·1 answer
  • An inventory management system that goes beyond just managing inventory to act as a complete distribution system (including inve
    10·1 answer
  • Suppose Alice, Bob, and Carol want to use secret key technology to authenticate each other. If they all used the same secret key
    10·1 answer
  • I know how to design it but I’m confused as to how to write a function code based on the info provided.
    10·1 answer
  • Design (draw a datapath) for a block that will help your processor decide whether to take a branch for different conditions. As
    8·1 answer
  • The loop function is similar to range(), but handles the parameters somewhat differently: it takes in 3 parameters: the starting
    14·1 answer
  • You want to copy data from one cell or range to an adjacent cell or range in your spreadsheet, without using a shortcut key. Whi
    10·1 answer
  • If the list [8,1,4,2,10,0] is sorted with the selection sort algorithm, what is the list at the 4th step of the algorithm?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!