1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vaieri [72.5K]
3 years ago
13

Which of these symbols is a special character that is accessible only from the Symbol dialog box? A. © B. + C. é D.

Computers and Technology
2 answers:
oksano4ka [1.4K]3 years ago
5 0

The correct answer is é.

All other choices are already accessible from the keyboard or with by using (c) in word it would automatically turn into this ®

Semenov [28]3 years ago
4 0

Since there is no D, your closest answer is C.
The answer is not a, because you can make the sign by putting c in-between parenthesis (c). (Works usually on Google).
The answer is not + either, as it is located on the keyboard.

Hope this helps

You might be interested in
You are opening a store, and having a working website is an important part of your project plan. The company that started creati
masya89 [10]

Answer:

I think it might be Budget and time. :)

5 0
3 years ago
In your own words, describe what an acceptable use
astraxan [27]

The acceptable use policy is known to be a policy that is made up of  practices that all its users need to agree to in order to be able to make use of such network or other resource.

The items are:

  • Social media page .
  • Internet address, applications.
  • Accessing private or confidential information.

<h3>What is an acceptable use policy?</h3>

An acceptable use policy (AUP) is known to be document that is said to tell about the  constraints as well as the practices that a user need to agree to be able to  access a  given corporate network or the Internet.

Therefore, The acceptable use policy is known to be a policy that is made up of  practices that all its users need to agree to in order to be able to make use of such network or other resource.

Learn more about acceptable use policy from

brainly.com/question/2625500

#SPJ1

6 0
1 year ago
Diana is running a successful remarketing campaign. She wants to expand her reach with other targeting options. While creating a
mart [117]

Answer:

B: Audience interest around different topics.

Explanation:

When using Google Ads, and the main aim is to create a campaign for a particular marketing activity, there are several options that makes Google Ads the ideal application for this purpose. However, choosing similar audiences under the targeting option is simply telling google to find users or audiences that are interested in the different topics, but are in one way or the other connected to your marketing activity or campaign.

8 0
3 years ago
How to check if your computer has bluetooth?
Lelu [443]
Assuming you're running Windows, click the start button, and then search for "Device Manager" (or open CMD or PowerShell and type devmgmt.msc). Look at the list of devices. If Bluetooth is there, you have it; if it's not there, you don't. 
5 0
3 years ago
P6. In step 4 of the CSMA/CA protocol, a station that successfully transmits a frame begins the CSMA/CA protocol for a second fr
Karo-lina-s [1.5K]

Answer:

To avoid collision of transmitting frames.

Explanation:

CSMA/CA, carrier sense multiple access is a media access control protocol of wireless networks that allows for exclusive transmission of frames and avoidance of collision in the network. When a frame is not being sent, nodes listening for an idle channel gets their chance. It sends a request to send (RTS) message to the access point. If the request is granted, the access point sends a clear to send (CTS) message to the node, then the node can transmit its frame.

Many nodes on a wireless network are listening to transmit frames, when a frame is transmitting, the node has to wait for the access point to finish transmitting, so it sends a RTS message again to exclusively transmit a second frame.

8 0
4 years ago
Other questions:
  • You are looking for a backup that copies only the files that have changes since the last full backup. Which of the following wil
    13·1 answer
  • _______ is the remote performance of medical exams, consultations, health monitoring and analysis using special medical equipmen
    15·1 answer
  • Which option best describes the cheapest way to file your federal income taxes?
    5·1 answer
  • 1. Access and PowerPoint are not included in all configurations of Microsoft Office 2013.
    14·1 answer
  • Yahoo and Google are examples of __________ used to perform Internet research.
    14·2 answers
  • When was the phone Built
    13·2 answers
  • As an interviewer, it is not necessary to be at eye level with interviewee<br><br> True<br> False
    5·2 answers
  • In this lab, you complete a C++ program that uses an array to store data for the village of Marengo.
    8·1 answer
  • Three primary types of data that a forensic investigator must collect, in this order: 1.Volatile data 2.Temporary data 3.Persist
    11·1 answer
  • swer from the options 1. How many basic input devices does a desktop computer have? a)2 b)3 c)1 d)4 2. The computer equipment wh
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!