1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kondaur [170]
3 years ago
7

Write short cut of fully justified​

Computers and Technology
1 answer:
Slav-nsk [51]3 years ago
4 0

Answer:

To make text justified, select and highlight the text first, then hold down Ctrl (the control key) on the keyboard and then press J. To make the text left aligned again, press and hold down Ctrl on the keyboard and press L

You might be interested in
Which of the following occurs when the amount of money earned is greater than the
swat32

Answer:

When this happens, there is a surplus of money and you can pay off your debts.

6 0
4 years ago
Which kind of image is indispensable and needs added text to go with it? A. a map B. a chart C. a graph D. a photograph
Serhud [2]

I'm going to say a chart.  I could be wrong.  If the chart didn't have text with it- how do you know what the chart is for?


A map, it needs text, but these days people just use GPS's.

4 0
3 years ago
Read 2 more answers
In 2008, researchers at Princeton University demonstrated techniques to retrieve RAM contents after the computer had been powere
lora16 [44]

It’s called a “Cold Boot” attack
6 0
3 years ago
Bill's manager has asked him to send all staff members the directions for checking out the new projector. In one to two sentence
lawyer [7]
He could probably send an email to everyone.
or if they are at work he could conduct a conference.Or can paste the instructions on a public tasks board.

Hope it helps you.

:)
3 0
3 years ago
Read 2 more answers
In the context of intentional computer and network threats a ____ is a programming routine built into a system by its designer
lara31 [8.8K]

Answer:

a. backdoor

backdoor (also called a trapdoor) is a programming routine built into a system by its designer or programmer. It enables the designer or programmer to bypass system security and sneak back into the system later to access programs or files.

6 0
3 years ago
Read 2 more answers
Other questions:
  • Which mode can students use to ensure that their information is not saved in their Chrome browser
    15·1 answer
  • ​a(n) ____ is a communications device that connects a communications channel such as the internet to a device such as a computer
    11·1 answer
  • In excel, a cell is referred to by its cell __________, which is the coordinates of the intersection of a column and a row. answ
    14·1 answer
  • Tiff is the default file format for most digital cameras. <br> a. True <br> b. False
    12·1 answer
  • When you move a paragraph in a document that includes text with a footnote, what happens to the footnote reference?
    7·2 answers
  • What is the problem with the code snippet below? public class Test { public static void main(String[] args) { System.out.println
    6·1 answer
  • We use a cubic equation in which the variables and coefficients all take on values in the set of integers from 0 through p - 1 a
    8·1 answer
  • Role of computers in everyday life​
    15·1 answer
  • In what year did the manager and team depicted in the blockbuster film "Moneyball
    9·1 answer
  • Braxton is writing a program to design t-shirts. Which of the following correctly sets an attribute for color?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!