which of the following combinations of keys is used as a short for saving a document on a computer

Answers

Answer 1

ctrl+s  

is used to save

Hope this helped

-scav


Related Questions

Which of the two previously described wing designs should result in a longer flying time?

Answers

Answer:

If it's a bird than the bigger the wing span the faster it can fly... or possibly glide in the air longer. I think all plan wing sizes don't change the effect of how it goes. If it is something like the sky gliders than yes. It would most likely be in the sky longer.

JAVA

Write a method that takes an ArrayList of Strings, and an int numRepeats and returns a new ArrayList with the original ArrayList repeated numRepeats times.


For example if we had an ArrayList list with the values ["a", "b", "c"]:


repeatArrayList(list, 3)

Should return a new ArrayList with the elements:


["a", "b", "c", "a", "b", "c", "a", "b", "c"]


public ArrayList repeatArrayList(ArrayList list, int numRepeats)

{

}

Answers

Answer:

Explanation:

The following code is written in Java. It creates a function that takes in an ArrayList and an int parameter. Then it loops through the array and adds each element into a new array called newList but adds them the number of times that the numRepeats argument states. Output can be seen in the attached image below.

import java.util.ArrayList;

class Brainly{

   public static void main(String[] args) {

       ArrayList list = new ArrayList();

       list.add('a');

       list.add('b');

       list.add('c');

       ArrayList newList = repeatArrayList(list, 3);

       System.out.println(newList);

   }

   public static ArrayList repeatArrayList(ArrayList list, int numRepeats) {

       ArrayList newList = new ArrayList();

       for (int x = 0; x < numRepeats; x++) {

           for (int i = 0; i < list.size(); i++) {

               newList.add(list.get(i));

           }

       }

       return newList;

   }

}

Hardware failure, power outages, and DOS attacks will affect:

data confidentiality.

data integrity.

data verification.

data availability.

Answers

Answer:

The answer should be data availability

Match the roles to the task they perform.

gather requirements
create software framework
identify errors in the software
develop program code for software

Role

software architects
business analysts
programmers
testers

Answers

Software Architects: “develop program code for software”

Business Analysts: “gather requirements”

Programmers: “create software framework”

Testers: “identify errors in the software”

1) The Output of a computer can be seen on
b) Mouse
a) Monitor
c) Keyboard​

Answers

Answer:

Explanation:

Option B monitor is the correct answer

Answer:

ans is a

hello

myself swapna

What is an "Expert System"?

If you can’t answer pls leave It

Answers

Answer:

program that use artifical intelligents

Explanation:

Expert system, a computer program that uses artificial-intelligence methods to solve problems within a specialized domain that ordinarily requires human expertise.

ANSWER ALL QUESTIONS CORRECTLY PLEASE AND YOU WILL GET A BRAINLIEST AND 10+ POINTS!!!! I WOULD REALLY APPRECIATE IT

Through the use of ICT and emerging technology in todays world, a number of sectors have been affected (whether in a positive or negative way). Three sectors in which ICT has had an impact are the health care, education, and banking sector.
Define the term ICT?

List three ICT tools that are commonly used in the education system?


Identify two ways in which ICT has impacted the education sector?

Answers

Answer: uhm can u explain what ICT is so i can understand the questions pls when i whould gladly help :)

Explanation:

One of the distinguishing characteristics of computer-based fraud is that access occurs ________________________. A. Through the Dark Web where the value of the stolen funds can be stored on hidden servers B. In violation of computer internal controls whether by management override or other means C. With the intent to execute a fraudulent scheme or financial criminal act D. When a hacker or virus successfully bypasses the firewall protecting financial data

Answers

Answer:

Option A, Through the Dark Web where the value of the stolen funds can be stored on hidden servers

Explanation:

Content that is available on dark web can not be detected by search engines specially through the traditional browsers or standard browsing technology. Along with that it has tens of thousands of sites and at a time only  certain limited number of sites are available.

Money related frauds are basically driven by this dark web. Criminal enterprises determine personal details through various means and hence can derive your credentials and financial details. The criminal portions of the dark web makes trade in fraudulent information easy and accessible

Hence, option A is correct

Two parter:

A.) What is wrong with the program segment below? The program does not contain syntax errors.

B.) Fix the programming error(s)

num = 1;

while (num < 9)
{
cout << num;
num = num - 1;
}

Answers

Answer:

the variable num is not declared so the compiler doesn't define it.

add int before num:

int num = 1;

while (num < 9)

{

cout << num;

num = num - 1;

}

now the code will run but it won't stop as it will never break the condition (num < 9).

Compare the OSI Application Layer with the TCP/IP Application Layer. Which statement is true? Both application layers are relevant mainly to programmers, not to network technicians. The OSI application layer involves more things than does the TCP/IP application layer. They are the same layer, only they are viewed through different conventions. The TCP/IP application layer is for the user; it is not important to programmers or network technicians.

Answers

Answer:

They are the same layer, only they are viewed through different conventions.

Explanation:

OSI model stands for Open Systems Interconnection. The seven layers of OSI model architecture starts from the Hardware Layers (Layers in Hardware Systems) to Software Layers (Layers in Software Systems) and includes the following;

1. Physical Layer

2. Data link Layer

3. Network Layer

4. Transport Layer

5. Session Layer

6. Presentation Layer

7. Application Layer

Each layer has its unique functionality which is responsible for the proper functioning of the communication services.

On the other hand, the Transmission Control Protocol and Internet Protocol (TCP/IP) Application Layer comprises of four (4) main layers and these includes;

I. Application layer.

II. Transport layer.

III. Internet layer.

IV. Network layer.

This ultimately implies that, the Open Systems Interconnection (OSI) Application Layer and the Transmission Control Protocol and Internet Protocol (TCP/IP) Application Layer are the same layer, only they are made up of different number of layers and as such are viewed through different conventions.

Answer:

c

Explanation:

n
How does an informal outline usually organize information?
A. With letters
B. With bullet points
C. With numbers
D. With Roman numerals

Answers

The answer is (B. With bullet points) have a good day :)

1. What is a Network?

A.an arrangement of intersecting horizontal and vertical lines.

B.a group or system of interconnected people or things.

C.files on a computer

D.a device drive used to carry information




Answers

B. a group or system of interconnected people or things

Write a program that asks the user for the name of a file. The program should display the contents of the file with each line preceded with a line number followed by a colon. The line numbering should start at 1. (You can create a file and populate it with some data, then run your program to open that file and display the contents line by line with the number of the line preceding the line data)

Answers

Answer:

Explanation:

The following program is written in Python. It asks the user for the file name (which needs to be in the same directory as the program) and reads the file. It then splits it by lines and saves it into an array. Then it loops through the array, printing each line with its corresponding line number.

file_name = input("File Name: ")

f = open(file_name, 'r')

lines = f.read().split('\n')

for line in lines:

   print(str(lines.index(line) + 1) + ': ' + line)

20 POINTS-
can someone help with this?

Answers

Answer:

large storage= data warehouse

data from daily= world wide

data storaage= transactional

online data= relational

I rlly don't know I'm kinda guessing here for don't take my word to heart it's been a bit since I've learned this

Sam is a Windows system administrator responsible for setting up client workstations for different departments. After installing the operating system, Sam manually disables certain programs that aren't needed by that department. Recently, Sam learned a few workstations had been compromised. The security analyst suggests that the disabled applications may have been the target. Going forward, what should Sam change in his process

Answers

Answer:

not disable any programs after installing a new operating system

Explanation:

Sam should simply not disable any programs after installing a new operating system. If the system is working as intended then he should leave it be, as the saying says "Don't fix what isn't broken". When a new operating system is installed, the entire system is usually wiped, meaning that the only programs installed have been installed as defaults by the operating system. Usually, this is for a reason and acts as security measures for the user, the system, and all of the data. Most of these programs interact with each other and work off of each other's data. Removing them from the system can prevent other very important functions of the operating system from performing their duties, which in term can compromise the entire security of the system. Therefore, the best thing to do would be to not remove these default programs.

Betty set up an account on a popular social networking website. She wants to know whether the privacy policy is effective for her account. Which information should she look for in this document?

Answers

the info needed to log in

-This would show what is protected in the privacy policy and its related to you since it would show personal data.

-A good Privacy Policy depends on understanding these matters - showing that this is not an agreement to take for granted.

Why do chloroplasts appear only in plant cells and lysosomes appear only in animal cells?

Answers

Answer:

Both animal and plant cells have mitochondria, but only plant cells have chloroplasts. ... Because animals get sugar from the food they eat, they do not need chloroplasts: just mitochondria.

Which tab automatically becomes available after inserting a text box? Drawing Tools Insert Text Box Tools Shape Tools

Answers

Answer:

insert text box

Explanation:

Explanation:

format tab

Explanation: when you draw a text box a new tab called the format tab appears. it contains tools to design and format and modify the text box.

What is Polymorphism in programming? Explain in your own words with examples.

Answers

Answer:

A computer program which can change on it's own, such as a polymorphic virus that is harder to detect. It can change it's own code to achieve the same goal but have a different structure.

Explanation:

Answer:

Polymorphism is a feature of object-oriented

programming languages that allows a specific routine to use variables of different types at different times. Polymorphism is the ability of a programming language to present the same interface for several different underlying data types.

Explanation:

hope it helps

what are the answers for Quiz 7 answers computer science principles

Answers

Answer:

unknown

Explanation:

this sounds like it is very vague and could be confused with other tests, i do not know of any tests like this

another thing is you can ask each question, even though it would cost more points, it would be better in the long run, people with similar questions can find their answers easier, AND you can get the correct answer for each question with confidence

that and people are more willing to answer one question at a time then a whole quiz lol

not saying what you are doing is bad, its just impractical and not an easy way to go about this

hope you find the answers you need, have a great day/night mate :D

Find what the secret message is. Get Brainliest if you are fast and correct.

Answers

Answer:

What does your digital footprint say about you?

Explanation:

Just follow the path from the end to the start, that's how I always get mazes.

Answer:

What does your digital footprint say about you?

Explanation:

Columns are identified by numbers (1,2,3,4,5....) and Rows are identified by letters (A,B,C,D,E.....) True False

Answers

The answer would be true. Hope this helps you

Fill in the blank!!!!!!!!!!!!!!!!!!!! ASAP!! Please!!!
Recent improvements in __________ have increased the pace of globalization.

Answers

i think it is technology

so I believe that the word you are looking for is technology

Hope this helps

-scav

The first step to keeping your home safe is to minimize the overall amount of _______________ materials you store in your home. (9 letters)

Answers

Answer: Hazardous

Explanation: Hazardous materials should be kept somewhere safe.

Answer:

i believe it would be dangerious

Explanation:

You are the network administrator for a city library. Throughout the library, there are several groups of computers that provide public access to the internet. Supervision of these computers has been difficult. You've had problems with patrons bringing personal laptops into the library and disconnecting the network cables from the library computers to connect their laptops to the internet. The library computers are in groups of four. Each group of four computers is connected to a hub that is connected to the library network through an access port on a switch. You want to restrict access to the network so only the library computers are permitted connectivity to the internet. What can you do to fix this problem

Answers

Answer: Configure port security on the switch

Explanation:

Since there need to be a restriction on access to the network so that the library computers will be the only ones that are allowed connectivity to the internet, the thing that can be done to fix the problem is to configure a port security on the switch.

When a port security is configured, it helps in securing the network and this will in the prevention of unknown devices from being connected to the network.

test unit 8 edhesive answers ​

Answers

What are the questions

What is the difference between electrical and electronic devices?

Answers

Answer:

A difference is that the electrical devices makes the electrical energy into the other forms of energies, such as heat, light, sound, gravitational, and nuclear. . . The electronic device controls the flow of electrons for performing the task.

Answer:

the different between electrical and electronics devices is the electricity and the power of inside of some devices which are considered most powerful electronics from, because the difference is the battery.

Explanation:

i hope it helps ;)

images that are made up of pixels and cannot be resized without losing quality?

Answers

Answer:

there are no known pictures that can be zoomed in and not lose quality. they will all be pixelized. mostly everything on a computer is made of pixels.

Explanation:

hope this helps!

~evita

True or False? Apprenticeships have been used for thousands of years to pass knowledge on to a succeeding generation.

Answers

Answer:

true

Explanation:

true true true true true

A way to categorize information and point you to where to find that information is called
a. An index c. A table of contents
b. A glossary d. Both A and C

Please select the best answer from the choices provided
A
B
C
D

Answers

I think the answer is D

Answer:

D

Explanation:

Other Questions
francium phosphate+ cesium acetate Shivani jars 4 liters of jam everyday. How many days does Shivani need to spend making jam if she wants to jar 32 liters of jam in all? PLEASEEEEE HELP ME...... Anyone know Spanish 1? I'm in need of help right now Please answer this fill it to least to greatest A baker decorates 42 cupcakes in 30 minutes. She decorates cupcakes at a constant rate. Which choice best describes the purpose of this poster?1) portray the enemy as an evil that needs to be fought2) keep morale up at the Home Front3) psychologically dishearten the enemy troops 3. En qu fecha fue construido elMonasterio? Which of the following is NOT a compound? Water Ammonia Gold Salt Write a fraction to represent the probability of rolling a two. Name the lines of latitude that are labeled north of the equator. What would be the next label after 75 *N? Find the length of side x in simplest radical form with a rational denominator. Which function's graph is shown below?O A. y=-sin xO B. y= -c0s XO C. y = cos xO D. y = sin x Why is technology important in our lives? Paragraph, please. Find the y-coordinate and the gradient at the points on the following curve corresponding to the given value of x:1) 3x^2-2x^3, x = -2 Which choice is equivalent to the product below?3x5x6O A. 310O B. 910O C. 35O D. 103 Help me please. Any help will be appreciated Practice: GCF and LCM-- Quiz-- Level F-- I-readyHow many minutes after Caylan puts the trays in the oven will he first remove the scones, muffins, and cookies at the same time?Scones bake 15 minutesMuffins bake for 12 minutes Cookies bake for 10 minutes__ minutes helpp !!! me plssssssss The best unit of measure for the liquid in an eyedropper is the liter.True.False.