1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
algol [13]
3 years ago
14

What is command is used to improve the vocabulary and in which tab is it found​

Computers and Technology
1 answer:
Sholpan [36]3 years ago
5 0

Answer:

Writers Talk About Writing

Ctrl+Shift+Return: Keys to Your Computer

By Mike PopeOctober 15, 2012

Your computer's keyboard has around 110 keys by which you can make your wishes known to the machine. Most of these have obvious labels: if you press the A key, the letter A appears on the screen. Some are less obvious, though — the Shift key and the mysterious Ctrl key — and in this article I'll explore why they're named what they're named.

Long before computers, many practical issues about using a machine to write had already been worked out for the typewriter. If you've never used a typewriter, you might be interested in this video that shows one in action.

You might be interested in
What does the following Boolean operators do?<br>AND function<br>OR function<br>NOT function​
Alisiya [41]
Hdehehdbendjdhwjsjsjjs
6 0
3 years ago
How can I code this in Python with only if-statements? (Only allowed to use the built-in functions int(), float(), and str().)
yan [13]

str)float)sorry dont know

5 0
3 years ago
before donating a computer you should use a program to wipe the hardest to remove all of his data true or false
Katarina [22]
True or they could get into your stuff. 
6 0
4 years ago
It is important to create an IT security program structure that aligns with program and organizational goals and describes the o
AleksandrR [38]

Answer:

Management and coordination of security-related resources

Explanation:

It is essential to make sure that an information security program is highly secured and non-authorized personnel cannot get access to the program. The security of the program is also important to ensure that valuable information and data of clients are safe. This is one of the most vital in security management.

8 0
3 years ago
(100 points ASAP PLease) Type the correct answer in the box. Spell all words correctly.
Katena32 [7]

Answer:

Maria can ensure that the video is recording correctly by checking the _____. 1. See answer.

8 0
2 years ago
Other questions:
  • Gloria needs to show in spreadsheet form the number of students in her class who speak different languages. Which type of graph
    7·1 answer
  • Who is good with Introduction to photography? I don’t know nothing about cameras if you do please contact me ASAP
    13·1 answer
  • What does zooming do? A. Changes your view of the Frame Editor to be closer or farther away B. Changes your view of the Event Ed
    12·1 answer
  • Which is the last step in conducting a URL search?
    5·2 answers
  • Question 2 of 5
    8·1 answer
  • Which approach to knowledge management capitalizes on tacit knowledge and requires heavy IT investment?
    7·1 answer
  • If you want Nud3s add me on sc Kermit4lyfe1
    11·2 answers
  • Please tell fast plzzzzzzz​
    11·1 answer
  • How many different textile items would you find at a festival? (please list 5 items)
    7·1 answer
  • Are programs that understand physics and/or hardware embedded? for example, one that uses finite-element methods to predict flui
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!