1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ser-zykov [4K]
3 years ago
6

EASY What does the Backspace key do?

Computers and Technology
1 answer:
arsen [322]3 years ago
5 0

Answer:

Removes characters behind (or to the left of) the insertion point.

Explanation:

You might be interested in
Let cell E2 = 100, what is the result of this formula? =NOT(E2<100) *
lukranit [14]

Answer:

True

Explanation:

7 0
3 years ago
I will mark brainillist if someone answers Donethkm question its How can a Word user insert a page break into a document to isol
zloy xaker [14]

Answer:

Open the dialog box.

Select the tab.

Select the tab.

Explanation:

cause

8 0
4 years ago
Read 2 more answers
In the context of firewall as a nonbiometric security measure, a _____ is software that acts as an intermediary between two syst
irga5000 [103]

Answer:

Proxy Server                        

Explanation:

  • Proxy server is a server that acts as a mediator between two systems.
  • One system can be your computer and the other can be the server to which you are asking a service, such as requesting a web page.
  • Lets suppose you request a web page from a server and you type a URL of a website to access a web page.
  • This request goes to proxy server which sends this request on your behalf to the target server in order to retrieve that web page.
  • Proxy server makes this request to the target server on the internet by using one of its IP addresses.
  • When the proxy server gets that web page, it will forward that web page to your requesting computer.
  • If you request a specific service such as a website frequently the proxy server saves that website on its cache.
  • So if you request that website again, proxy server will forward it to you from its cache rather than requesting it again from the target server on your behalf resulting in quick response to the user's request.
  • Proxy servers provide users with privacy to access the websites, and they can surf the internet anonymously .
8 0
3 years ago
Pls help!!!!!!!!!!!!
son4ous [18]

Answer:

i am 100% sure it is (B)

Explanation:

To delete offensive or irrelevant posts  

5 0
4 years ago
Which of the following devices collects data directly from the environment for input into a computer system?A) Audio input B) Se
harkovskaia [24]

Answer:

Option (B) i.e., Sensor is the correct answer.

Explanation:

The following option is true because the sensor is both types of device that is input as well as output that gather information or data from the environment directly.

Option A i.e., Audio input is incorrect because the audio input that device which records the voice, music or audio in the form of data.

Option C i.e., Trackball is incorrect because trackball record the movement of the ball in which direction we move that ball, in that direction the cursor is moving.

Option D i.e., Touch Screen is incorrect because it is the device that works by the touch of the human being such as touchpad, mobile phones, etc.

3 0
3 years ago
Other questions:
  • Are sql injections legal?
    15·1 answer
  • Which part of the os provides users and applications with an interface to manipulate files?
    8·1 answer
  • At what two layers of the osi model are lan and wan protocols likely to differ??
    7·1 answer
  • Edhesive 4.1 question 1
    9·1 answer
  • Pls help is very urgent and I will mark u as brainliest plsssss​
    11·2 answers
  • Construct a regular expression that recognizes the following language of strings over the alphabet {0 1}:
    10·1 answer
  • Explain the role of the network layer and Internet protocol (IP) in order to make internetworking possible.
    8·1 answer
  • A location in memory which stores a value, the value can change as the program is running is
    12·1 answer
  • Discuss the information justify with two examples<br>​
    11·1 answer
  • ___________ is some danger that can exploit a vulnerability.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!