1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natulia [17]
3 years ago
8

The _______ has shortcuts to commonly used commands

Computers and Technology
2 answers:
Colt1911 [192]3 years ago
4 0
The keyboard has short cuts to commonly used commands like

Ctrl + c = Copy
Ctrl + v = paste
Ctrl + b = to write with bold characters
Ctrl + i =  to write with <em>italic </em>characters 


Burka [1]3 years ago
3 0
The keyboard has short cuts to commonly used commands like print, screenshot, etc. called shortcut keys.
You might be interested in
The ____ algorithm was the first public key encryption algorithm developed (in 1977 and published for commercial use.
Whitepunk [10]
The RSA Algorithm was developed by and named after the initials of: Ron Rivist, Adi Shamir, and Leonard Adleman while they were working at MIT. It was developed in 1977 and published in 1978.  The algorithm uses the exponentiation modulo in encrypt and decrypt information. 
7 0
3 years ago
A search engine that crawls uses
RoseWind [281]

Answer:

web crawlers or spider software

Explanation:

A search engine that crawls uses the web crawler or the spider software. And it also uses the server side JavaScript based crawlers and programming languages like Python and PHP. The search engine finds the content category through the meta keywords and directs the page to the index. The index contains details of similar types of pages, And each page has one category, and if category is not found which is rarest, a new category is being created.

7 0
3 years ago
In PKI, the CA periodically distributes a(n) _________ to all users that identifies all revoked certificates.
Trava [24]

Answer:

" CRL (certificate revocation list)" is the appropriate answer.

Explanation:

  • A collection of such subscriber bases containing accreditation or certification status combined with the validation, revocation, or outdated certification within each final customer is known as CRL.
  • Only certain subscribing workstations with a certain underlying cause authentication system should have been duplicated.
4 0
3 years ago
Consider the classes below, declared in the same file: class A { int a; public A() { ​ a = 7; } } class B extends A { int b; pub
DiKsa [7]

Answer:

2. <em>A reference of type A can be treated as a reference of type B</em> - False

Base class or its objects are not related to their derived class (or its objects).

Explanation:

class A {

   int a;

   public A() {

       a = 7;

   }

}

class B extends A {

   int b;

   public B() {

       b = 8;

   }

}

///////////////////////////////////////////////////////////////////////////////////////////////////////

1. <em>After the constructor for class B executes, the variable a will have the value 7 </em>- True.

When an object of a derived class is declared, the constructor of base class is called before the constructor of derived class (is called).

3. <em>Both variables a and b are instance variables </em>- True.

Classes can have instance, or member, variables and methods.

4.<em> After the constructor for class B executes, the variable b will have the value 8</em> - True.

When object of class B is declared, its constructor was called, which initialized variable b to 8.

4 0
3 years ago
In the microsoft powerpoint view tab, which presentation view enables a user to view one slide at a time in the slide pane? a no
fredd [130]
Normal is the correct answer
6 0
3 years ago
Other questions:
  • Which of the following roles is responsible for writing programming code?
    10·1 answer
  • _____ remove the part of an image starting from an edge​
    13·1 answer
  • To filter a list with the Filter function, on an Excel spreadsheet, you need to perform the following steps: (1) click in any ce
    9·1 answer
  • Television, radio, newspapers, magazines, the Internet, and other forms of communication are collectively referred to as thea. W
    15·1 answer
  • In order to preview an attachment in an e-mail, click the attachment in the ______
    8·1 answer
  • How does a programmer use digital waves to transfer sound?
    11·1 answer
  • Which of the following guidelines about the subject line of e-mail messages is most appropriate?
    15·2 answers
  • Please tell fast plzzzzzz​
    5·2 answers
  • You are writing a program using the Java language. Which of the following is a requirement of Java syntax?
    6·1 answer
  • A central issue of public sharing is:
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!