Match each of the following items to their shortcut selections:I.One wordII.One line of textIII.One sentenceIV.One paragraphV.Entire documentA.Press and hold Ctrl and click in the item to select itB.Press Ctrl+AC.Double-click the itemD.Triple-click in the itemE.Place the pointer at the left of the item in the margin area and click

Fill in the blank(s) with the appropriate word(s).


C, E, A, D, B

Computer Science & Information Technology

You might also like to view...

A ____________________ is a simple, working example that demonstrates whether or not an idea is feasible.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Encrypted control of remote computers using the RDP protocol is accomplished using what port number?

a. TCP 22 b. UDP 161 c. TCP 3389 d. UDP 10000

Computer Science & Information Technology

The "hacker ethic" makes the claim that ____.

A. all hacking is positive hacking B. information sharing is a powerful positive good C. hackers are ethically ok as long as they have fun D. hacking is acceptable as long as it is a solitary activity

Computer Science & Information Technology

The naming convention for folders on your web server is usually determined by the ____.

A. user B. developer C. DNS D. hosting company

Computer Science & Information Technology