1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PtichkaEL [24]
3 years ago
6

I am the combination of keys used to write data in multiple lines in the same cell​

Computers and Technology
1 answer:
koban [17]3 years ago
3 0

Answer:

Explanation:

The answer is keyboard

You might be interested in
Why operating system is important software for a computer give five reasons
RSB [31]

Explanation:

1). the os basically is what makes your puter run correctly.

2). u can set a time every day for computer updates.

3 0
3 years ago
Which statement about digital certificates is​ FALSE? A. The CA verifies a digital certificate​ user's identity online. B. Digit
liq [111]

Answer:

A

Explanation:

chicken

7 0
4 years ago
Establishing responsibilities, planning to best support the organization, acquiring validity, ensuring performance, conformity w
RUDIKE [14]

Answer: B. ISO 38500

Explanation:

ISO 38500 is an international Standard specifically developed by the International Organization for Standardization to oversee corporate governance of Information Technology. It lays down principles to guide directors and leaders of organizations on how to comply with regulatory requirements in the use of Information Technology within the firm.

The framework consists of six guiding principles in the use of I.T and they include; establishing responsibilities, planning or strategizing on how best to support the organization, acquisition of validity, ensuring performance, conformity with rules and respect of the human factor or behavior.

It was derived from the Australian Standard for Corporate Governance of Information and Communication Technology - AS 8015 - 200.

8 0
3 years ago
_____ is a method of access control that prevents unauthorized users from using an unattended computer to access the network and
Hoochie [10]

Answer:

Terminal Resource Security

Explanation:

Terminal Resource Security is a type of access control that prevents unwanted user from using a computer that is not in use to access the data and network. It is feature in a software that ensures that the screen of a computer is erased and a user is automatically signed off after a particular length of inactivity. It is used by many organizations.

5 0
3 years ago
Which of the following changes the features (e.g., thickness of the line, shadow, 3-D effect, single or double, etc.) of the bor
lilavasa [31]
Border style
I hope it’s work
8 0
3 years ago
Other questions:
  • Select the correct answer.
    7·1 answer
  • Approximately what percentage of the world population owns a smartphone?
    9·1 answer
  • Jorge needs to print out an essay he wrote but he does not have a printer his neighbor has a printer, but her internet connectio
    12·1 answer
  • You manage 20 windows workstations in your domain network you want to prevent the sales team members from making system changes
    10·1 answer
  • How can your microsoft word processing skills affect overall writing skills on the job?<br><br>​
    7·1 answer
  • Software refers to the physical parts of a computer.<br> a. True<br> b. False
    11·2 answers
  • The sun emits invisible _____&gt; A) electromagnetic waves B) Waves C) Radiation D) Wavelength E) Ultraviolet Light
    8·1 answer
  • Gina, an IT professional, noticed that the servers were running very slowly. She evaluated the system and made a recommendation
    9·2 answers
  • What are three advantages of using enterprise software in an organization?
    10·1 answer
  • For her presentation on Italy, Matilda used a red background with light green text. When her friend critiqued her presentation,
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!