1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Savatey [412]
3 years ago
12

What keyboard shortcut keys selects cell A1

Computers and Technology
1 answer:
aleksandr82 [10.1K]3 years ago
7 0
The answer is ctl + Home
You might be interested in
Which of the following works on the pay-per-click (PPC) and cost-per-click (CPC) concept? ~ Plato
galben [10]

Answer:

First- tier search engines such as Google Ads and Bing Ads.

Explanation:

3 0
3 years ago
How can you efficiently restrict the read-only function of a requesting SNMP management station based on the IP address?
mezya [45]

Answer:

Place an ACL on the line when configuring the RO community string.

Explanation:

Controlling Access via SNMP

SNMP is a protocol used by network management systems to monitor and control network-attached devices. Ciscoworks, HP Openview, and other management stations all use SNMP.

SNMP access can be granted on a network device in two ways—read-only and read-write. Read-only access allows the management station to poll the device for statistics and other information, but it does not allow anything to be changed. Read-write access allows the management station to make changes to the configuration of the device.

It's obviously a good idea to make sure you trust the devices allowed to make changes to your configuration, but some versions of SNMP use only a simple shared password to permit access. To make this more secure, an ACL can be applied, which limits the source IP addresses that can use SNMP.

8 0
3 years ago
Weak Induction
slega [8]

Answer:

Following are the answer to this question:

Explanation:

In option 1:

The value of n is= 7, which is (base case)

\to 3^7

when n=k for the true condition:

\to 3^k

when n=k+1 it tests the value:

\to 3^{(k+1)}= 3^k,3\\\to < (k!) 3 \ substituting \ equation \\\to

since k>6  hence the value is KH>3 hence proved.

In option 2:

when:

for n=1:(base case)

\log(1!)

0<=0 \\ condition is true

when the above statement holds value n=1

when n=k

\log(k!)

when n=k+1

\log(k+1)!=\log(k!)+\log(k+1)\\

             

\because k \log k      [\therefore KH>K \Rightarrow  \log(KH>\loK)]

In option 3:

when n=1:

A_1 \cup B=A_1 \cup B\\\\

when n=k

\to (A_1\cap A_2 \cap.....A_k) \cup B\\=(A_1\cup B) \cap(A_2\cup B_2)....(A_k \capB).....(a)\\\to n= k+1\\ \to (A_1\cap A_2 \cap.....A_{kH}) \cup B= (A_1\cup B)\\\\\to  [(A_1\cap A_2 \cap.....A_{k}) \cup B]\cap (A_{KH}\cup B)\\\\\to  [(A_1\cup B) \cap (A_2 \cup B) \cap (A_3\cup B).....(A_k\cup B)\cap (A_{k+1} \cup B)\\\\  \ \ \ \ \ \ substituting \ equation \ a \\\\

hence n=k+1 is true.

7 0
3 years ago
List the types of infrared we have
Vlad [161]

Answer: infared types like the sun, sun light, heat lamps, and radiators

6 0
3 years ago
What was Ada Lovelace's contribution to computer science?
Alika [10]

Answer:

She made the first computer.

Explanation:

Augusta Ada King, Countess of Lovelace (née Byron; 10 December 1815 – 27 November 1852) was an English mathematician and writer, chiefly known for her work on Charles Babbage 's proposed mechanical general-purpose computer, the Analytical Engine.

8 0
2 years ago
Read 2 more answers
Other questions:
  • How can you differentiate between standard and protocol? Write at least on example of each of these terminologies?
    12·1 answer
  • A blank is a link on a web page that leads to another web page.
    14·1 answer
  • Truck drivers probably cannot see your vehicle if you cannot
    6·2 answers
  • Write c++ program bmi.cpp that asks the user bmi.cpp the weight (in kilograms) and height (in meters).
    12·1 answer
  • The Harrison Group Life Insurance company computes annual policy premiums based on the age the customer turns in the current cal
    5·1 answer
  • Fill in each blank with the correct step from the fetch-execute cycle.
    14·1 answer
  • what is musical technology specifically, the origins of its genesis &amp; its importance to the baroque era
    6·1 answer
  • Compare mini and mainframe computer in terms of speed,memory and storage​
    15·1 answer
  • A ____________ protocol is software that provides or facilitates a connection in which no information is retained by either send
    13·1 answer
  • An operating system with _____ capabilities allows a user to run more than one program concurrently.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!