1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
leva [86]
3 years ago
5

Which of the following combinations of keys is used as a short for saving a document on a computer

Computers and Technology
1 answer:
Masja [62]3 years ago
7 0

ctrl+s  

is used to save

Hope this helped

-scav

You might be interested in
Match the OOP concept to its definition.
Alekssandra [29.7K]

Answer:

defines a class in terms of another class = inheritance

inherits the properties of a base class = derived class

provides only essential information to the world = data abstraction

binds data and functions together = encapsulation

Explanation:

6 0
3 years ago
Write a function called prod_all that takes any number of arguments and returns their sum. Test the function by using these two
sattari [20]

Answer:

from functools import reduce

def prod_all(*args):

   prod = reduce(lambda x,y: x *y, args)

   return prod

result = prod_all(4,6,8)

print(result)

Explanation:

The use of the "*args" passes a tuple of variable length to a python defined function. The function above takes any number of arguments and returns the product using the python reduce module and the lambda function.

3 0
3 years ago
Into which of these files would you paste copied information to create an integrated document? A. Mailing list B. Source C. Data
viva [34]

it would be b.mailing list


5 0
3 years ago
Read 2 more answers
The attached question
FinnZ [79.3K]
Constructor method

The new operator instantiates a class by allocating memory for a new object of that type. new requires a single argument: a call to a constructor method. Constructor methods are special methods provided by each Java class that are responsible for initializing new objects of that type.
8 0
3 years ago
To protect the computer network of a large organization, network engineers monitor network traffic. This traffic is compared to
ioda

Answer:

To protect the computer network of a large organization, network engineers monitor network traffic. Malware detection method of data mining best being used to protect the network.

Explanation:

Data mining has excellent potential as a malware detection tool. It allows us to analyze vast sets of information and gives an opportunity to extract new data from it. It also provides the ability to identify both known and zero-day attacks.

5 0
3 years ago
Read 2 more answers
Other questions:
  • Write a loop that prints each country's population in country_pop. Sample output with input:
    7·1 answer
  • Which of the following does a histogram resemble the most?
    13·1 answer
  • Witch of the following is a valid why a scientist might a scientific theory
    13·1 answer
  • EMERGENCYYYYY what does it mean when i get a security alert when i download an addon on google docs
    7·1 answer
  • Differences between laptop andhandheld conputer​
    12·1 answer
  • What are the examples of debugging?​
    14·1 answer
  • Implement the function printTwoLargest that inputs an arbitrary number of positive numbers from the user. The input of numbers s
    14·1 answer
  • Choose the list of the best uses for word processing software.
    5·1 answer
  • Create a mobile app plan using PowerPoint slides to show mock-ups of screens,
    6·1 answer
  • What is the output for the code below?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!