When entering data, you can use the _____ key(s) to move from one field to the next without having to move your hand to the mouse.
A. Ctrl+Tab
B. Ctrl+Alt
C. Esc
D. Tab
Answer: D
Computer Science & Information Technology
You might also like to view...
In_______ attacks, a network’s resources are taken up by unauthorized traffic, restricting the access of legitimate users.
a) denial-of-service. b) resource. c) flooding. d) None of the above.
Computer Science & Information Technology
Draw an expression tree for the expression (9 + 4) * 5 + (4 - (6 - 3)).
What will be an ideal response?
Computer Science & Information Technology