When entering data, you can use the _____ key(s) to move from one field to the next without having to move your hand to the mouse.

A. Ctrl+Tab
B. Ctrl+Alt
C. Esc
D. Tab

Answer: D

Computer Science & Information Technology

You might also like to view...

In_______ attacks, a network’s resources are taken up by unauthorized traffic, restricting the access of legitimate users.

a) denial-of-service. b) resource. c) flooding. d) None of the above.

Computer Science & Information Technology

Draw an expression tree for the expression (9 + 4) * 5 + (4 - (6 - 3)).

What will be an ideal response?

Computer Science & Information Technology