1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olga nikolaevna [1]
4 years ago
8

What key is used to create spaces between lines within a document?

Computers and Technology
1 answer:
Naily [24]4 years ago
4 0

I guess the correct answer is the Enter key

Οn cοmputеr kеybοards, thе еntеr kеy in mοst casеs causеs a cοmmand linе, windοw fοrm, οr dialοg bοx tο οpеratе its dеfault functiοn. This is typically tο finish an "еntry" and bеgin thе dеsirеd prοcеss, and is usually an altеrnativе tο prеssing an ΟK buttοn.

You might be interested in
____ policy establishes criteria for classifying and securing the organization's information in a manner appropriate to its leve
pav-90 [236]

Answer:

Correct Answer is (d) Information sensitivity policy

Explanation:

Information sensitivity policy establishes the criteria for classifying and securing the organization's information in a manner that is appropriate to its level of security.

However, other options are incorrect. Server security can be established only on servers and on information/data that is in the server from unauthorized access. While VPN security is used for protecting network and encryption is used to encrypt data from illegal access.

However, only information sensitivity policy is used for classifying and securing organization information to the outside world.

The intention of information sensitivity policy:

The intention of using any information sensitivity policy is to help the employee to determine what information can be disclosed to non-employee, as well as the relative sensitivity of the information that should not be disclosed outside of the company without proper permission or authorization from supreme leadership of an organization.

7 0
3 years ago
TLE 10 - ICT
Kipish [7]

Answer:

Information And Communication Technology

5 0
3 years ago
How can you continue learning about computer science and improve your coding abilities?
Crank

Answer:

5 Ways to Improve Your Coding and Programming Skills

Take advantage of books and other free resources. ...

Sign up for a bootcamp. ...

Practice, practice, practice. ...

Engage with the computer science community. ...

Pursue a formal education in computer science.

7 0
3 years ago
What was most monumental decision in making a trip to Oregon?
White raven [17]

Answer:

A. The amount of food to take on the journey

Explanation:

Hope you get it right!!

3 0
3 years ago
Read 2 more answers
_________________ allows cloud controller to locate instances on separate zones to boost redundancy.
kogti [31]

Answer:

_____Router___ allows the cloud controller to locate instances on separate zones to boost redundancy.

Explanation:

A router, as a networking device, forwards data packets between one computer network and other networks.  With a router, one can use wired and wireless devices to connect to the Internet.  Unlike a modem, which connects the home network to a wider internet, a router can enable the networks to interact with one another without using the Internet.

8 0
3 years ago
Other questions:
  • To type the letter address, _________ space from the dateline
    9·2 answers
  • Write a program that displays the following pattern: ..\.\* .\.\*** \.\***** ******* \.\***** .\.\*** ..\.\* That is, seven line
    8·1 answer
  • How many instructions can the microprocessor execute each second if the assembly line is present?
    12·1 answer
  • How is a cell named in microsoft excel 2016
    10·1 answer
  • The picture that graphically represents the items you use in windows is called a/an
    5·1 answer
  • What quantities are measured by the following sensors:
    9·1 answer
  • The objective of ____ testing is to identify and eliminate execution errors that could cause a program to terminate abnormally,
    15·1 answer
  • Stephanie would like to know the average number of regular hours worked by her employees. In cell B11, create a formula using th
    8·1 answer
  • Why is the Microsoft website considered the best source for information about pagefile.sys?​
    15·1 answer
  • What steps can you take to secure your private information?.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!