1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mademuasel [1]
2 years ago
9

Which key doesn't relate to keyboard A:return key B :enrollment key C: delete key D:tab key

Computers and Technology
2 answers:
Setler79 [48]2 years ago
8 0
The enrolment key is not in the keyboard so the answer is B.
ycow [4]2 years ago
7 0

Answer:

Photosynthesis is a process used by plants and other organisms to convert light energy into chemical energy that, through cellular respiration, can later be released to fuel the organism's activities.

Explanation:

You might be interested in
Which statement does not describe the guidelines for the use of text in presentation programs?
olganol [36]
Choice a
have a great day

7 0
2 years ago
Bytes are arrangements of
tigry1 [53]
The answer is B. Eight bits
7 0
2 years ago
Most panoramic photography focuses on what subject?
Verizon [17]
Landscapes is the correct answer. Just google it and click images.
4 0
2 years ago
Read 2 more answers
What does FIFO mean?
zubka84 [21]
Hello there!

It is First In First Out

Hope This Helps You!
Good Luck :)
6 0
2 years ago
Read 2 more answers
Organizations should communicate with system users throughout the development of the security program, letting them know that ch
Fed [463]

Answer:

Yes it is true.The organization should indeed communicate with a system user throughout the development of a security program. A corporation needs a security policy that must be developed by management at all levels, including organization and employees at the operational level. For a corporate security plan, it is essential to reduce the resistance of the expected changes and define the objective.

Explanation:

Three objectives of the security plan in an organization are:

  • Identify the sensitive system and plan
  • Create and define the strategy and control of the system.
  • Develop and implement the training programs.

Security Information is one of the essential factors in the organization.For an organization, the information should be protected.

7 0
2 years ago
Other questions:
  • Jack is an accountant. He can't access the spreadsheet software, which is installed on the server. What should Jack do?
    5·2 answers
  • What are rules that enforce basic and fundamental information-based constraints?
    12·1 answer
  • Click cell C6 in the Data worksheet and insert a column. Type Series Name in cell C6. Click cell C7 in the Data worksheet and in
    9·1 answer
  • Next, go to the mw_tour.html file. Within the document head, create links to the mw_layout.css and mw_styles.css style sheet fil
    10·1 answer
  • To check if your operating system is up to date, click Start then click Control Panel and choose _______________. Select one: a.
    11·1 answer
  • Wedding photographers must be skilled at producing photographs that capture the
    8·1 answer
  • Create a macro named mReadInt that reads a 16- or 32-bit signed integer from standard input and returns the value in an argument
    5·1 answer
  • in your own ideas what are the disadvantages of participating in a videoconference write your answer inside the circle​
    13·1 answer
  • What is the base of a number system?
    8·1 answer
  • Electronic résumés have an attractive, highly formatted appearance. please select the best answer from the choices provided t f
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!