1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
atroni [7]
3 years ago
11

Emma opened a new document a Microsoft word and typed her assignment. She is now planning to save the documents for the first ti

me. Which function key can she use to save the document?
ASAP plz!!

Computers and Technology
1 answer:
ycow [4]3 years ago
3 0

Answer:

E.  F12

Explanation:

You might be interested in
1.Public policy begins with . 2.Then, government officials . 3.Finally, a government agency .
dexar [7]

Answer:

what was the wuestion

Explanation:

cause we dont know how to help you

4 0
3 years ago
Brain of the computer system is called​
bagirrra123 [75]

Answer:

central processing unit in short form CPU :)

5 0
3 years ago
Read 2 more answers
Jasmine is writing a shopping app. She has created a variable to keep track of the number of items in the shopping cart. Everyti
Gemiola [76]

Answer:

b. cart total + 1

Explanation:

A. cart total=1 do increment the total with every 1 click here, it only 're-assigns cart total with value 1 for every click, hence it's always 1.

B. In every click, 1 is always added to the previous value of cart total, like addItemButton(cart total+1) or so.

C. This would have worked too if "cart total" and "cartTotal" where of same type.

D. cart total is just being initially defined here.

E. Likewise here, var shows that cart total has just only been declared.

6 0
2 years ago
Read "Penetration Testing – Reconnaissance with NMAP Tool," located within the required readings. In the article, the authors di
steposvetlana [31]

Answer:

Check the explanation

Explanation:

The two tools that are utilized for consideration in cyber attacks are operating systems and computer systems. The operating system Kali Linux 2.6 3.x Mix (64-bi) and windows XP SPO (32-bit).

Penetration testing is a very important technique or procedure in auditing the loopholes and security in a particular operating system. The computer systems are Nmap and VMware. The author posit that VMware is a virtual machines programming that gives a virtual PC the capacity for more than one event or action of the working frameworks to keep cunning one similar server.

Nmap (“Network Mapper”) according to the authors, it is a free and open source utility for system reviewing and security. these tools are used for the purpose of finding an open port and to also gain access while another considers the vulnerabilities of the operating system.

ALL together these tools assist in building the foundation for ethical hacking. Using Nmap allows a hacker to gain access to the system thereby seeing all the flaws to actively peruse that account. All these tools work together for a successful hacking process and procedures.

5 0
3 years ago
List and describe the 3 tasks learners can do in a Technology classroom.
Anna11 [10]

The 3 tasks learners can do in a Technology classroom.

1. Telling digital stories .

2. Filming tasks on mobile phones .

3. Making lists of things done.

<h3>What are the three roles of technology for learners?</h3>

Technology is known to be a tool that often gives a lot of students a kind of an easy-to-access to any kind of  information, as well as an accelerated learning, and others that the student can use to learn.

Note that this helps students to look inro new subjects and have a wider understanding of difficult topics.

Hence, The 3 tasks learners can do in a Technology classroom.

1. Telling digital stories .

2. Filming tasks on mobile phones .

3. Making lists of things done.

Learn more about Technology from

brainly.com/question/25110079

#SPJ1

3 0
2 years ago
Other questions:
  • What substance was the first photograph made from?
    6·1 answer
  • Click to move a stacked object to the top of the stack?
    8·1 answer
  • _______ refers to the poitically, religiously, or ideologically motivated use of computers (or related technology) by an individ
    15·1 answer
  • Review the given requirements using the checklist and discover possible problems with them. The following requirements are for a
    8·1 answer
  • In addition to the four primary computer operations, today's computers almost always perform ____ functions.
    7·1 answer
  • Computer hardware without computer software is useless while computer software without computer hardware is meaningless. Discuss
    10·1 answer
  • Which of the following devices are least likely to deny a connection inline when an attack is detected? (select 2)
    6·1 answer
  • -(-13) P binary using signed. 2's complement representation
    11·1 answer
  • Can a result that contains road maps for European countries have a highly meets rating
    12·1 answer
  • An e-commerce client is moving from on-premise, legacy systems to a cloud-based platform. During the transition, the client is a
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!