1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andru [333]
3 years ago
11

9. Which of the following commands is executed with the shortcut 'Ctrl+Z'?

Computers and Technology
1 answer:
Igoryamba3 years ago
5 0
<h3>Answer: B. Undo</h3>

Explanation:

This command is often found under the "edit" menu of many programs. On the toolbar, the undo button is a backwards (sometimes curved) arrow. More specifically, the arrow points to the left as if to mean "go back and fix". Likely it points to the left due to many western languages reading from left to right, so the undo arrow goes in the opposite direction.

In contrast, the "redo" button points in the other direction to repeat the last action you applied. The redo button also undoes whatever the undo button did. For instance, if you deleted a word and then hit undo, then the word would come back. Hitting redo will delete the word again.

You might be interested in
Charlie makes pizza at a restaurant. The customers always compliment how great the pizza tastes. But Charlie takes a long time t
Oksi-84 [34.3K]
To get this u must do 8372928+(2728279298)=382627-6382638)()()(7372637 I did it right I’m the test
8 0
3 years ago
Read 2 more answers
Which statement describes a mobile device feature? Docking stations can add some functionality to mobile devices such as video o
pogonyaev

Answer:

<em>The statement that describes a mobile device feature is docking stations can add some functionality to mobile devices such as video output.</em>

Explanation:

Because a docking station is a device that connects a mobile to multiple peripherals. It provides a single connection point that allows a mobile to function like a desktop computer.

8 0
4 years ago
In computing, a(n) _____ is an attack on an information system that takes advantage of a particular system vulnerability. Select
tensa zangetsu [6.8K]

Answer: d) Exploit

Explanation: Exploit is a type computer attack that successful when the computer system of an user is vulnerable and attacker can do the exploitation. This happens due to the weakness of the system, applications software, network etc.

Other given option are incorrect because exit door,glitch and bad are not any type of attack in the computer field that causes harm to the system.Thus the correct option is option(d).

4 0
3 years ago
A(an) _______ is a set of instructions that a computer follows to perform a task.
Vikentia [17]
A(an) _______ is a set of instructions that a computer follows to perform a task.Answer is Program .
I hope the answer of the question.
7 0
4 years ago
Which of the following describes how modern operating systems function?: A
sertanlavr [38]

Answer:

Try B

Explanation:

6 0
3 years ago
Other questions:
  • In a doubly linked list, every nodecontains the address of the next node and the previousnode except for the ____ node.
    8·1 answer
  • To alter just one character in a StringBuilder, you can use the ____ method, which allows you to change a character at a specifi
    5·2 answers
  • Name three actions you can perform on an inserted image.
    7·2 answers
  • Which of the following is a variable expense for many adults?
    11·2 answers
  • What is the combination of the mechanical or digital process of film production and the illusion or illusions created in the min
    12·1 answer
  • Sam plans to use this image in artwork for a brochure about airplanes. Which principles of page layout is Sam planning to use in
    11·1 answer
  • Wake up to reality. Nothing ever goes as planned in this world. The longer you live,the more you realize that only pain, sufferi
    5·1 answer
  • What kinds of objects might benefit from the use of the Loop Cut and Slide tool, and why? In your own words, how does edge loop
    14·1 answer
  • Write the pseudocode for this flowchart
    6·1 answer
  • The Horse table has the following columns:
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!