1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KIM [24]
2 years ago
7

This is Microsoft Word. ONLY RIGHT ANSWERS. 50 points

Computers and Technology
1 answer:
pishuonlain [190]2 years ago
5 0
She should select the first sentence then press and hold ALT while selecting the second sentence
You might be interested in
What are the steps involved in accepting all the changes in a document?
I am Lyosha [343]
  1. you can accept or reject the changes one at a time or all at one time.
  2. click at the beginning of the document , and then on the review tab, click next to go to the first tracked change.
  3. Click Accept or reject to keep or remove the change.

Keep repeating the step 2 until you've reviewed all of the changes in your document.

*Hope this helps !!! Mark me Brainliest :)

7 0
3 years ago
Read 2 more answers
If you must transmit a file over an insecure channel, one way to prevent its contents from being seen by someone who might inter
natali 33 [55]

Answer:

connect to the network from a remote location using a VPN.

Explanation:

VPN stands for virtual private network, it allows computers to establish a secure connection through an encrypted tunnel for exchanging data between two end points when communicating through insecure channels like the internet.

8 0
3 years ago
What is the value of ans after the following code has been executed? int x = 35; int y = 20, ans = 80; if (x < y); ans = y; g
Sauron [17]

100

After the following code has been executed, the value of ans is 100:

int x = 35;

int y = 20;

ans = 80;

if (x < y) {

 ans += y;

}

This is because the value of ans is incremented by y when the code is executed.

Learn more here:

brainly.com/question/27093439

#SPJ4

8 0
1 year ago
When an antivirus program identifies a virus and quarantines this file, has the malware been eradicated
jekas [21]

Answer:

NO

Explanation:

  • No, it's not, when a virus blocks a file stored in a sandbox, it does not affect the system.
  • However, the virus program does not necessarily recognize other parts of the program. It still takes analysis to determine what. Also, the virus vault must be emptied to delete the original files

4 0
3 years ago
Sharon is troubleshooting a computer and wants to test the hard drive in another computer. Sharon removes the hard drive and not
spayn [35]

Answer:

The correct answer to the following question will be "Molex connector".

Explanation:

  • Molex connector seems to be the dialect term for the connectivity of a two-piece plug and socket. The two-piece concept was pioneered by the company named Molex Connector and has become an established electronic design.
  • Inside a PC case, it brings DC control to the devices. The wide one of those on the right is being used for discs, DVD and CD-ROM drives, whereas the narrow one is being used for floppy along with other items.

Therefore, Sharon has to use the Molex connector to test any type of drive in their device.

4 0
3 years ago
Other questions:
  • This information is generally included on a fax cover sheet.
    15·1 answer
  • Which failure or flaw in a computer system causes an undesired outcome?
    11·1 answer
  • Which hexadecimal-type address refers to a physical networking device such as a network interface card?
    10·1 answer
  • Taken together, the physical and data link layers are called the ____________________. Internet layer Hardware layer Internetwor
    15·1 answer
  • What is the output of the following program?
    9·1 answer
  • Why do some people think the global<br> economy is good for the United States?
    10·1 answer
  • Shay writes programs to make operating systems easier for people to use. Her job title is best described as .
    7·1 answer
  • In a network, multiple critical paths can occur. true or false
    13·2 answers
  • Write a boolean expression that is true if s references the string end.
    8·1 answer
  • Years ago when working a helpdesk, the most common question asked, almost daily, was about resetting passwords. What type of kno
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!