1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natulia [17]
3 years ago
8

The _______ has shortcuts to commonly used commands

Computers and Technology
2 answers:
Colt1911 [192]3 years ago
4 0
The keyboard has short cuts to commonly used commands like

Ctrl + c = Copy
Ctrl + v = paste
Ctrl + b = to write with bold characters
Ctrl + i =  to write with <em>italic </em>characters 


Burka [1]3 years ago
3 0
The keyboard has short cuts to commonly used commands like print, screenshot, etc. called shortcut keys.
You might be interested in
After you select your recipients, the next step in using the Mail Merge Wizard would be to _____.
NARA [144]

Answer:

Write your letter

Explanation:

When using a Mail Merge Wizard in a Microsoft Word Document, this is the process.

  • Click on your document type
  • Click on the starting document
  • Select the recipient(s)
  • Write your letter and add some custom fields
  • Insert your address Block
  • Strike enter and click on Greeting line (to enter a greeting)
  • Preview your letter and click on complete merge
3 0
3 years ago
Read 2 more answers
How do you see the recent IT evolution (e.g. platforms, big data, Internet of Things, etc.) affect Internet security and privacy
torisob [31]

Answer:

Answered below

Explanation:

With the evolution and growth of technology, and as we are increasingly having our everyday lives dependent on technology, there arise problems that shouldn't be ignored.

Security of people's personal data and information is of paramount importance. Access to personal information and the sale of these information to companies without the owner's permission is a breach of privacy and one of the challenges we face today.

With the growth of data, there are newer threats and attacks on software security systems to steal these data and therefore there's a need for everyday assessment and improvement in security of data.

3 0
3 years ago
The company that you work for has recently had a security breech. During the recover and assessment, it was discovered that the
mars1129 [50]

Answer:

I recommend Digital Certification of User through trusted certification Authority, who is requesting to access the company website through VPN to make sure the identity of the user.

Explanation:

Digital Certificate is the type of identity key or certificate that is assigned to the users as per their request. It is a unique number that is assigned to the user to ensure the authentication that Who are you. It is same like our identity card number that shows our identity to someone as per requirement.

These certificates are issued by certification organizations that are registered or trusted. If the users are using VPN on their devices to access some website that may not be a trusted user or a malware that can hurt the company by breaching the security protocols. So, some companies didn't allow untrusted users to websites.

<em>Therefore, I recommend to my company that, they should ensure that the users that are trying to access the website through VPN must have some digital Certificate from trusted certification authority to ensure the identity of the users.</em>

<em />

6 0
3 years ago
Look at the file pathway below. What is the folder name that the document "chemlab1.doc" is stored in?
goldfiish [28.3K]

Answer:

chemlab1.doc stored in biology folder which stored in folder studies which stored in mydocs folder which is in C local disk

Explanation:

5 0
3 years ago
The java class library interface queue method to put an entey on the back of a queue that returns false if the method falls is
Mars2501 [29]

Answer:

(A) Add.

Explanation:

The add method of queue inserts an element at the tail of the queue.

syntax:- queue.add(element);

It's return type is boolean it returns true if the insertion is successful and returns false if the insertion is unsuccessful and it returns an IllegalSpace Exception if there is no space left to insert an element in the queue.

5 0
3 years ago
Other questions:
  • The fractional_part function divides the numerator by the denominator, and returns just the fractional part (a number between 0
    8·1 answer
  • In order to look up ipv4 and ipv6 dhcp leases, what two files should be viewed?​
    10·1 answer
  • Explain why regular system cleanup is vital to ensuring the operating system runs efficiently.
    8·1 answer
  • What is one benefit of using electronic sticky notes ?
    9·2 answers
  • Assume that you have created a class named DemoCar. Within the Main() method of this class, you instantiate a Car object named m
    12·1 answer
  • When you insert a photo into a document, its placed at the ​
    13·2 answers
  • Communication media that use an antenna for transmitting data through air or water are called _____.
    14·1 answer
  • What constructs break or bend the normal Syntax patterns of scheme?
    15·1 answer
  • How do I type fast?<br><br> Give me an actual answer...
    11·2 answers
  • Answer pls pls pls pls pls ​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!