1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natasha_Volkova [10]
3 years ago
5

How can you resize the program window?​

Computers and Technology
2 answers:
Daniel [21]3 years ago
4 0

Answer:

Resize a window by dragging the edges or corner of the window. Hold down Shift while resizing to snap the window to the edges of the screen and other windows. Move or resize a window using only the keyboard. Press Alt + F7 to move a window or Alt + F8 to resize.

dexar [7]3 years ago
4 0

Answer:If you are running Microsoft Windows 7, Windows 8, or Windows 10, you can use Windows key keyboard shortcuts to resize and arrange windows on your computer. For example, pressing the Windows key and the left arrow key resizes it to fit only the left half of the screen.

You might be interested in
Write a function in MATLAB that takes as an input a matrix of coefficients for a system of linear equations (A), the solution ve
Illusion [34]
Answer is A all the way to the right
7 0
4 years ago
What is a method whereby new problems are solved based on the solutions from similar cases solved in the past?
swat32

Answer:

"Case-Based Reasoning" is the answer for the above question.

Explanation:

  • Case-Based Reasoning is a process of decision-making theory in which the new problems were solved based on the previously solved problem.
  • It is used in artificial intelligence and robots. This helps to make any AI and robots to do the work and take decisions on its own.
  • The theory is used to make any computer that behaves like humans. It can take decisions like a human.
  • The above question asked about the method by which the new problem is solved on behalf of the old problem. Hence the answer is "Case-Based Reasoning".
3 0
3 years ago
List and describe two of the four generally recognized security positions.
Llana [10]
CISO: This person reports directly to the CIO and is responsible for assessing, managing, and implementing security.
Security Technician: Entry-level position and provides technical support to conFgure security hardware, implement security software, and diagnose and troubleshoot <span>problems</span>
8 0
4 years ago
. What is suboptimization?
Vera_Pavlovna [14]

Answer: Suboptimization is referred to as a term that has been approved for common policy mistake. It usually refers to the practice of concentrating on a single component of a whole and thus making changes which are intended towards improving that component and also ignoring its effects on other components.

3 0
3 years ago
Match the feature to its function. 1. Normal view provide rows of icons to perform different tasks 2. Notes view an area in whic
pashok25 [27]

Answer:

Match the feature to its function.  The answers are as below:

1. Normal view the place where creating and editing occurs  

2. Notes view an area in which information for handouts can be added  

3. Slide pane the place where the slide order can be changed

4. Menu bar contains lists of commands used to create presentations  

5. toolbars provide rows of icons to perform different tasks  

Explanation:

It is the normal view where the editing and the creation of the slides occur. And it's the notes view where you can add the information for handouts. You can arrange the slides in the slide pane. And you can get a list of commands for creating the presentation in the Menu bar. Also, Toolbar is the rows of icons which helps in performing a various set of tasks. And all these are definitions and prove our above selections are correct.

6 0
3 years ago
Read 2 more answers
Other questions:
  • What types of data are commonly entered into a cell ?
    7·2 answers
  • _____ learners prefer to interact with others on group projects.
    8·1 answer
  • What is the main function of the motherboard?
    12·1 answer
  • In the context of web and network privacy, an acceptable use policy is _____.
    15·1 answer
  • A help desk manager needs to know the
    15·1 answer
  • Write a program in java using switch case statement
    11·1 answer
  • Asymmetric key encryption combined with the information provided by a. certificate authority allows unique identification of the
    8·1 answer
  • The internet's data gathways rely on what kind of hardware devies to route data to its destination?
    14·1 answer
  • Indentation is useful to make the document easier to read. To increase the indentation of the paragraph, you press the increase
    10·1 answer
  • to see additional functions available in an open desktop, document or website what action should the user perform?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!