1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bulgar [2K]
3 years ago
7

You can use this keyboard shortcut to toggle the visibility of the command line. If for some reason your command line is hidden

from the drawing area, then use this keyboard shortcut to bring it back *
​
Computers and Technology
1 answer:
lbvjy [14]3 years ago
4 0

Answer:

Ctrl + 9

Explanation:

You can use this keyboard shortcut to toggle the visibility of the command line

You might be interested in
The state licensing bureau recently conducted a survey at Community Hospital. During this review, the surveyors determined that
marshall27 [118]

Answer: Opportunity for Improvement

Explanation:

Any healthcare organization, service, or process that does not reach the established standard or the customer's expectations, is an opportunity for improvement. Furthermore, the Improving Medicare Post-Acute Care Transformation Act (IMPACT) established a quality reporting program aimed to find those opportunities for improvement. Once the problem has been established, is prudent to place an action plan to achieve the desired performance improvement aim.

3 0
3 years ago
What does ‘‘negotiation’’ mean when discussing network protocols? give an example?
rewona [7]
Some protocols have multiple algorithms to choose from for e.g., cryptographic purposes. During connection set up, client and server negotiate which one they'll use.

One example is the set up of a TLS connection. During the handshake, the client shares a list of its supported ciphers (the 'ciphersuites'). The server responds by indicating the best one that both sides support.

4 0
3 years ago
For our computer club in school, we are making a discord server and seeing who can get the most members. I am making an Anime Se
Gwar [14]

Answer:

misteragua#1874

Explanation:

5 0
2 years ago
What is a good principle to implement when you find yourself attempting to
Maurinko [17]

its less is more A

to much could make it really bad

5 0
3 years ago
1. Your task is to process a file containing the text of a book available as a file as follows:A function GetGoing(filename) tha
Irina18 [472]

Answer:

See explaination

Explanation:

#function to count number of characters, words in a given file and returns a list of words

def GetGoing(filename):

file = open(filename)

numbrOfCharacters =0

numberOfWords = 0

WordList = []

#iterate over file line by line

for line in file:

#split the line into words

words = line.strip().split()

#add counn of words to numberOfWords

numberOfWords = numberOfWords + len(words)

#find number of characters in each word and add it to numbrOfCharacters

numbrOfCharacters = numbrOfCharacters + sum(len(word) for word in words)

#append each word from a line to WordList

for word in words:

WordList.append(word)

#display the result

print("The number of characters: ", numbrOfCharacters)

print("The number of Words: ", numberOfWords)

#return the list of words

return WordList

#find matches for keywords given in textlist

def FindMatches(keywordlist, textlist):

for keyword in keywordlist:

keyword = keyword.lower()

print ("The number of occurrences of {} is: {}".format(keyword,len([i for i, s in enumerate(textlist) if s == keyword])))

#main

booktext = GetGoing("constitution.txt")

FindMatches (['War', 'Peace', 'Power'], booktext)

7 0
3 years ago
Other questions:
  • ________ is digital textual information that can be stored, manipulated, and transmitted by electronic devices.
    7·1 answer
  • 2. A body is thrown vertically<br>100 m/s Theme taken to retum​
    13·1 answer
  • In symmetric encryption the same key is used to encrypt and decrypt a message. in asymmetric encryption different keys are used
    6·2 answers
  • Without entering into the internet cloud or intranet cloud, how many icons in the topology represent endpoint devices (only one
    6·1 answer
  • Type an SQL statement into the Record Source property of the report. The statement should select all fields (*) for employees wi
    5·1 answer
  • How we know that how many domain exist in window server 2012?
    14·1 answer
  • Write an expression to compute the quartic root of x. the quartic root of a number is the square root of its square root. exampl
    11·1 answer
  • When an external device becomes ready to be serviced by the processor the device sends a(n)_________ signal to the processor.
    8·1 answer
  • Need answer ASAP.
    8·1 answer
  • How do i delete cookies on a chromebook?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!