1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ann [662]
3 years ago
7

List any ten keyboard symbols.​

Computers and Technology
1 answer:
Nostrana [21]3 years ago
3 0

Answer:

Esc- Esc (escape) key.

F1 - F12 What are the F1 through F12 keys?

F13 - F24 Information about the F13 through F24 keyboard keys.

Tab Tab key.

Caps lock- Caps lock key.

Shift- Shift key.

Ctrl - Control key.

Fn- Function key.

Alt- Alternate key (PC only; Mac users have an Option key).

Spacebar- Spacebar key.

Hope this helps, have a great day/night, and stay safe!

You might be interested in
Transistor was the major technology used during the ____ generation of hardware.
gulaghasi [49]

 

<span>Second generation of computer apparatus. Second Generation: Transistors (1956-1963)</span>

The world would see transistors substitute vacuum tubes in the second generation of computers. The transistor was created at Bell Labs in 1947 but did not see omnipresent use in computers until the late 1950s. 

The transistor enormously higher positioning to the vacuum tube, allowing PCs to transform into littler, speedier, less expensive, more vitality effective and more dependable than their first-generation predecessors. Though the transistor still generated a great deal of heat that subjected the computer to destruction, it was a vast development over the vacuum tube. Second-generation computers still confidence on punched cards for input and printouts for production.

<span> </span>

6 0
3 years ago
Being nice take the points​
MArishka [77]

Answer:

Sure!!! and thank you very much

4 0
3 years ago
Intranets:
SOVA2 [1]

Answer:

A, C, D and E

Explanation:

An intranet is synonymous to a private LAN or WAN network but in contrast to the extranet or internet. Resources are retrieved and/ or shared within devices in the private network. It uses the internet protocol suite model of networking for communication, but also uses private IP addresses, which are not routable on the internet.

The communication between devices can be a peer to peer connection or client-server connection, using the mainframe computer technologies as the dedicated servers of the network.

7 0
4 years ago
You wish to use your personal laptop computer at work, but the it department folks will not allow this. the likely reason is tha
Kruka [31]

Answer: Your non-work related use of a laptop could increase vulnerability.

Explanation: Vulnerability is one of the most important and stressed out section in IT, so it's best to decrease that possibility whenever!

I hope this helps!

3 0
2 years ago
When a style set has been inserted in a document, the spacing of the style set can be easily changed.?
Stells [14]
Yes that statement is correct. 
7 0
3 years ago
Other questions:
  • After a file downloads, you can do any of the following except
    13·1 answer
  • RDBMS stands for_________________
    12·1 answer
  • In a shooter game, players can play “capture the flag,” which is a multiplayer game in which players of a team need to collect f
    15·2 answers
  • Write the simplest statement that prints the following on a single line: 3 2 1 Go! Note: Whitespace (blank spaces / blank lines)
    11·1 answer
  • ∑_(A,B,C,D,E)▒〖(2,4,6,8,10,12,14,16,18,20,22,24,26,28,30)〗
    8·1 answer
  • 9. Ways in which a person or object is influenced by the surrounding environment​
    8·1 answer
  • Select the best answer that completes the following sentences. Wireless technology changed the workday to
    6·2 answers
  • Please help with this
    8·1 answer
  • Uuhdcnkhbbbbhbnbbbbnnnnnnnnnfddjkjfs
    14·1 answer
  • In Python, which comparison operator means "less than or equal to"?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!