1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maksim [4K]
3 years ago
6

When you use the keyboard to scroll to a different position in the document, the ____ automatically moves when you press the des

ired keys.
a. roster
b. alt tag
c. insertion point
d. smart tag
Computers and Technology
1 answer:
FrozenT [24]3 years ago
8 0

Answer:

Option C i.e., insertion point is the correct option.

Explanation:

if any user or person scrolls the following contents by using the keyboard from one position to another position in the document of the user then, the insertion point moves automatically without any implementation when the user presses any key they want. If the user clicks on the arrow keys then, it also works like that. So, that's why the following option is correct.

You might be interested in
1. If Earth's plates are constantly moving, why don't we need to update the locations of -
Dmitriy789 [7]

Answer:

Because the tectonic plates are moving so slowly in such small incraments that it would take a while before there was any noticable change.

Explanation:

4 0
3 years ago
Point: A Point in a two dimensional plane has an integer x coordinate value and an integer y coordinate value.
UNO [17]

Answer:

They are connected

Explanation:

8 0
3 years ago
The head of small organization wants to install a network so that all the employees of different department can share various re
Firdavs [7]

Answer:

While the Internet was evolving and creating a way for organizations to connect to each other and the world, another revolution was taking place inside organizations. The proliferation of personal computers inside organizations led to the need to share resources such as printers, scanners, and data. Organizations solved this problem through the creation of local area networks (LANs), which allowed computers to connect to each other and to peripherals. These same networks also allowed personal computers to hook up to legacy mainframe computers.

An LAN is (by definition) a local network, usually operating in the same building or on the same campus. When an organization needed to provide a network over a wider area (with locations in different cities or states, for example), they would build a wide area network (WAN).

CLIENT-SERVER

The personal computer originally was used as a stand-alone computing device. A program was installed on the computer and then used to do word processing or number crunching. However, with the advent of networking and local area networks, computers could work together to solve problems. Higher-end computers were installed as servers, and users on the local network could run applications and share information among departments and organizations. This is called client-server computing.

INTRANET

Just as organizations set up web sites to provide global access to information about their business, they also set up internal web pages to provide information about the organization to the employees. This internal set of web pages is called an intranet. Web pages on the intranet are not accessible to those outside the company; in fact, those pages would come up as “not found” if an employee tried to access them from outside the company’s network.

EXTRANET

Sometimes an organization wants to be able to collaborate with its customers or suppliers while at the same time maintaining the security of being inside its own network. In cases like this a company may want to create an extranet, which is a part of the company’s network that can be made available securely to those outside of the company. Extranets can be used to allow customers to log in and check the status of their orders, or for suppliers to check their customers’ inventory levels.

Sometimes, an organization will need to allow someone who is not located physically within its internal network to gain access. This access can be provided by a virtual private network (VPN). VPNs will be discussed further in the chapter 6 (on information security).

4 0
3 years ago
Describe deforestation
Leno4ka [110]
Removing of trees or clearing. 

8 0
4 years ago
What operating systems are you familiar with?
Andrew [12]

Well there are a few like

Microsoft Windows

Apple iOS

Apple macOS

Linux Operating System

3 0
3 years ago
Other questions:
  • Which image format is good for compressing large, complex images like photos into smaller file sizes?
    5·1 answer
  • Write a zip code class that encodes and decodes 5-digit bar codes used by the U.S. Postal Service on envelopes. The class should
    11·1 answer
  • What process makes one group a member of another group? nesting cloning copying grouping
    8·1 answer
  • PLS ANSWER ASAP!
    9·1 answer
  • What are the computer/electronic needs<br> that drive our economy today?
    13·1 answer
  • Which button could Pamela press in the Microsoft Word spell checker to make the word “colour” instantly change to “color” whenev
    11·1 answer
  • Consider the scenario below. Will the solution attempted by the technician fix the problem or make it worse? Defend your answer.
    5·1 answer
  • def list_length(shrinking_list): ''' A recursive way to count the number of items in a list. ''' if shrinking_list
    10·1 answer
  • In securing the client/server environment of an information system, a principal disadvantage of using a single level sign-on
    12·1 answer
  • What are the most common processes and procedures handled by data warehousing specialists? select all that apply.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!