1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tresset_1 [31]
3 years ago
12

Write at leaat 20 shortcuts on the Microsoft word.​

Computers and Technology
1 answer:
Flauer [41]3 years ago
3 0

Answer:

Open a document: Ctrl + O.

Create a new document: Ctrl + N.

Save the current document: Ctrl + S.

Open the Save As window: F12.

Close the current document: Ctrl + W.

Split the window: Alt + Ctrl + S.

Copy: Ctrl+C

Paste: Ctrl+V

Cut the current selection: Ctrl + X

Copy the current selection: Ctrl + C

Paste the contents of the clipboard: Ctrl + V

Bold: Ctrl + B

Italics: Ctrl + I

Underline: Ctrl + U

Underline words only: Ctrl + Shift + W

Center: Ctrl + E

Make the font smaller: Ctrl + [

Make the font bigger: Ctrl + ]

Change text to uppercase: Ctrl + Shift + A

Change text to lowercase: Ctrl + Shift K

Insert a page break: Ctrl + Enter

Add a hyperlink: Ctrl + K

Explanation:

You might be interested in
Write the function setKthDigit(n, k, d) that takes three integers -- n, k, and d -- where n is a possibly-negative int, k is a n
liq [111]

Answer:

Explanation:

Let's do this in Python, first we need to convert the number into string in order to break it into a list of character, then we can replace the kth character with d. Finally we join all characters together, convert it to integer then output it

def setKthDigit(n, k, d):

n_string = str(n)

d_char = str(d)

n_char = [c for c in n_string]

n_char[k] = d_char

new_n_string = ''.join(n_char)

return int(new_n_string)

6 0
4 years ago
What are examples of real-time applications
Savatey [412]

Typical examples of real-time systems include Air Traffic Control Systems, Networked Multimedia Systems, Command Control Systems etc.

3 0
4 years ago
Suppose you are choosing between the following three algorithms:
Pavel [41]

Answer:

Algorithm C is chosen

Explanation:

<u>For Algorithm A </u>

T(n) = 5 * T ( n/2 ) + 0(n)

where : a = 5 , b = 2 , ∝ = 1

attached below is the remaining part of the solution

6 0
3 years ago
A _______ is used to analyze and summarize your data without graphical support
kkurt [141]
<span>A Pivot table is used to analyze and summarize your data without graphical support</span>
3 0
4 years ago
Read 2 more answers
Which type of security policy is intended to provide a common understandingof the purposes for which an employee can and cannot
Zigmanuir [339]

Answer:A. ISSUE-SPECIFIC

Explanation:Security policy is a set of actions an organization,Country , State or local governments put in place on order to guarantee the security of life and properties. It can also be described as the restrictions on behavior or actions of members of a society, community or an organization as well as restrictions imposed on adversaries by processes such as doors, locks, keys and walls.

Issue specific policy are policies directed to treat or handle particular factors known to aid or abate a crime. It can also be used to outline or reach at an understanding of what to used or what not to use in order to ensure effective security in an organization.

6 0
4 years ago
Other questions:
  • Given two int variables, i and j, which have been declared and initialized, and two other int variables, itemp and jtemp, which
    14·1 answer
  • What is the most important external issue when using social media in emergency management?
    6·1 answer
  • A cyber community is different than a physical community because _________________. A.people can go to restaurants to meet frien
    13·1 answer
  • True or false a relational database is one in which every data item is related to every other data item
    6·1 answer
  • Which of the following Internet access methods involves connecting your phone to an Internet-ready laptop in order to gain acces
    14·2 answers
  • Which term describes the distance from one point on a wave to the same point on the next wave?
    13·2 answers
  • What does a motherboard legacy BIOS do?
    11·1 answer
  • Which of these is not a valid form<br>layout in Microsoft Access?​
    11·1 answer
  • How do cyber criminals target user’s end devices?
    11·2 answers
  • Trebuie sa scrii niște instrucțiuni în JavaScript care adaugă în DIV lungimea HTML-ului din interiorul tag-ului cu ID​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!