1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stiks02 [169]
4 years ago
10

If you hold down the alt key and click anywhere in your document what happens

Computers and Technology
1 answer:
sukhopar [10]4 years ago
4 0
<span>The Alt key on a PC is utilised to change the capacity of other squeezed keys. It will go to any desired short cut in the computer that is being accessed. in short , one can use this to reach other functionality of a windows based computer easily. For example, if you were accessing documents and you want to skip to a different function from what you were doing on the desktop.</span>
You might be interested in
After hacking into atm systems remotely using a laptop, What attacker worked with the atm manufacturers to resolve the identifie
Aneli [31]

grey hat hackers are those after hacking into ATM systems remotely using a laptop, works with the ATM manufacturers to resolve the identified security vulnerabilities

  • A grey hat hacker is simply known as an hacker that falls between the range of black and white hacker. They are known to illegally break into systems so as to show off their skills to the administrator of the system they penetrated or to seek to sell their services in repairing security breaches.

  • In the ATM case, they attacked it and then also want the ATM manufacturer to use their service.

Conclusively we can therefore say that the hacker was a gray hat hacker.

Learn more from

brainly.com/question/15899195

3 0
3 years ago
Please help...........​
MrMuchimi

Answer:

Explanation:

As a user of GPL v3 software, you have lots of freedom: You can use GPL software for commercial purposes. You can modify the software and create derivative work. You can distribute the software and any derivative work you produce, without having to ask for permission or pay

4 0
3 years ago
Read 2 more answers
"ikev2 requires the use of which of authentication protocol?"
katen-ka-za [31]
Ikev2 requires the use of authentication protocol called Extensible Authentication Protocol (EAP).  It is <span>is a protocol for wireless networks that ampiflies on the authentication methods for the Point-to-Point Protocol (PPP).</span>
4 0
3 years ago
Plz answer and dont put a random thing for the points
Anton [14]

<u><em>answer</em></u>: it it mostly likely to be the one that says "choose font style"

<u><em>explain</em></u>: im in advanced tech class so i think i know what this is:D

hope i helped you!:D

6 0
3 years ago
What's the technique of drawing a 3D object with one vanishing point?​
zepelin [54]
I don’t no it brother n I was searching for this answer can u plz tell me
7 0
3 years ago
Read 2 more answers
Other questions:
  • The numbers on the bottom of a typical check represent all of the following EXCEPT?
    12·2 answers
  • Which process is used to protect transmitted data in a vpn?
    12·1 answer
  • What's the purpose of maintaining a network of digital forensics specialists?
    14·1 answer
  • If the processor has 32 address lines in its address bus; i.e. 32-bit address range, what is its address space or range; i.e. wh
    10·1 answer
  • Can you give me a long list of kid's cartoons
    15·1 answer
  • When you buy software, you then own it and can do anything you’d like with it, including giving it to friends to install on thei
    12·1 answer
  • CORRECT ANSWER GETS BRAINLIEST
    8·2 answers
  • Написати лабараторну, на тему:Вивчення властивостей та застосування шаруватих пластиків та кермаміки
    13·1 answer
  • Any Danganronpa fans around here? I'm bored.
    13·2 answers
  • 8.10 Code Practice Question 3
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!