1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natali 33 [55]
2 years ago
9

If you click on repeat header rows what will happen?

Computers and Technology
1 answer:
Firdavs [7]2 years ago
6 0
It’s going to put a header row on your page
You might be interested in
Top-down programming divides a very large or complex programming task into smaller, more manageable chunks.
vekshin1

Answer:

A

Explanation:

Top-down is a programming style, the mainstay of traditional procedural languages, in which design begins by specifying complex pieces and then dividing them into successively smaller pieces.

5 0
3 years ago
Which operating system is used by most the supercomputer system in the world
DENIUS [597]

Answer:

Linux

Explanation:

Linux runs all of the top 500 supercomputers

3 0
2 years ago
A user is given Read permission to a file stored on an NTFS-formatted volume. The file is then moved to a different folder on a
Sav [38]

Answer:

Permissions do not apply here.

Explanation:

The reason is that FAT partitions do not have files and folders permissions, only have sharing permissions. Therefore, once the file has been removed from the NTFS partition, the restrictions that once applied to it are now gone.

5 0
3 years ago
Help with these 2 questions srry for the horrible pic​
Svetach [21]

Answer:

the first one is email address nd the second one is semi-blocked letters ? sorry if im wrong.

Explanation:

5 0
4 years ago
Read 2 more answers
Read the scenario, and then answer the question that follows.
nasty-shy [4]
D, a customer service oriented, problem solver with strong communication skills
8 0
4 years ago
Other questions:
  • Most information security incidents will occur because of _________. Select one: a. Users who do not follow secure computing pra
    10·1 answer
  • Assume that a two-dimensional rectangular array of integers called matrix has been declared with six rows and eight columns. Wri
    13·1 answer
  • List the five body functions that monitor homeostasis.
    7·1 answer
  • An application calculates an ending inventory amount based on a beginning inventory amount, sales, and returns. You need to crea
    8·1 answer
  • Problem 4 (25 points)Consider a byte addressing architecture with 64-bit memory addresses.(a)Which bits of the address would be
    5·1 answer
  • Can you distinguish between the following examples and determine which one is NOT creative work? a. software b. slogan c. screen
    15·1 answer
  • *please be serious and also answer everything * <br> I will also mark you brainliest :)
    6·1 answer
  • To read cheques, banks use​
    11·1 answer
  • How to ignore punctuation before and after a word javascript
    13·1 answer
  • How to add up multiple user inputs for example: If i ask the user How many numbers do you want to add? they say 5 then i out put
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!