adplus-dvertising
frame-decoration

Question

To delete an incorrect character in a document, ______ to erase to the right of the insertion point.

a.

Press the left mouse key

b.

Double click the right mouse

c.

Press the BACKSPACE key

d.

Press the delete key

Posted under IT Fundamentals

Answer: (d).Press the delete key

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. To delete an incorrect character in a document, ______ to erase to the right of the insertion point.

Similar Questions

Discover Related MCQs

Q. The operating system does all of the following except-

Q. All of the following are steps involved in the boot process except-

Q. The ______ storage on ROM chip, is responsible for loading the operating system from its permanent location on the hard drive in to RAM.

Q. The basic input/output system (BIOS) is storage in-

Q. Ensuring that the essential peripheral devices are attached and operational is the ____ Process.

Q. Hyper-threading (HT) is related to-

Q. Intel and AMD are leaders in-

Q. IDE (ATE) or SATA interface connect Mother board with-

Q. USB is a type of-

Q. Surgeons can perform delicate operation by manipulating devices through computers instead of manually. this technology is known as-

Q. Process of Combining strings is known as

Q. A program that performs a useful task while simultaneously allowing destructive acts is:

Q. In 1999, the Melissa virus was a widely publicized:

Q. An intentionally disruptive program that spreads from program to program or from disk to disk is known as

Q. The majority of computer crimes are committed by:

Q. A logic bomb that was created to erupt on Michelangelo's birthday is an example of a:

Q. Standardization of Microsoft programs and the Windows operating system has made the spread of viruses:

Q. HTML viruses infect:

Q. When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as:

Q. __________ is the measurement of things such as fingerprints and retinal scans used for security access.