1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vaieri [72.5K]
3 years ago
13

Which of these symbols is a special character that is accessible only from the Symbol dialog box? A. © B. + C. é D.

Computers and Technology
2 answers:
oksano4ka [1.4K]3 years ago
5 0

The correct answer is é.

All other choices are already accessible from the keyboard or with by using (c) in word it would automatically turn into this ®

Semenov [28]3 years ago
4 0

Since there is no D, your closest answer is C.
The answer is not a, because you can make the sign by putting c in-between parenthesis (c). (Works usually on Google).
The answer is not + either, as it is located on the keyboard.

Hope this helps

You might be interested in
What does a bonus object do? A. Subtracts lives B. Keeps track of a player's health C. Gives a player an advantage D. Makes text
lyudmila [28]

Answer:

C) Gives a player an advantage

Explanation:

I don't know the context of the question, but it makes the most sense.

5 0
3 years ago
Bytes are typically represented with a lowercase b and bits with an uppercase B.<br> true or false
34kurt

Answer:

False

Explanation:

Byte(B) is uppercase

bit(b) is lowercase

Good way to remember is that its takes 8 bits makes a byte. In other word, a byte is bigger than a bit so it makes sense that byte is uppercase.

7 0
3 years ago
When a router fails to send messages in a timely fashion, this is a problem of the _____.
natima [27]
<span>network layer  

hope it helped</span>
4 0
3 years ago
Who developed one of the first mathematical models of a multilevel security computer system?
svp [43]

Answer:

C. Bell and LaPadula

Explanation:

The first mathematical models of multilevel security computer system was developed by Bell and Lapadula. Their full names are David Elliot Bell and Leonard J. Lapadula. Their model used to define the concept of modes of access,secure state machine and outlined the rules of access.

6 0
3 years ago
To enable grammar correction in powerpoint, you must first enable office ____ services.
sesenic [268]

Answer:

Grammar

Explanation:

8 0
2 years ago
Read 2 more answers
Other questions:
  • On what dates did the 2016 Olympics take place( list all)
    9·2 answers
  • The most common types of utility programs fall into these categories. accessibility calculation communication data entry enterta
    6·2 answers
  • Python provides a special version of a decision structure known as the ________ statement, which makes the logic of the nested d
    13·1 answer
  • You work in the Accounting Department and have been using a network drive to post Excel workbook files to your file server as yo
    9·1 answer
  • As a general rule, the number of bullet points on a slide should not exceed _____. a.2 b.4 c.8 d.10
    9·1 answer
  • Is a pocket watch consider a computer
    15·1 answer
  • // Exercise 4.16: Mystery.java
    6·1 answer
  • In this project you will write a set of instructions (algorithm). The two grids below have colored boxes in different
    9·2 answers
  • 1) "Information systems are revolutionizing the way businesses function in the 21st century," Do you agree or disagree with this
    5·1 answer
  • Susan discovers the following log entries that occurred within seconds of each other in her Squert (a Sguil web interface) conso
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!