1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mila [183]
4 years ago
12

Which of the following options would you use when saving a document with a new filename? *

Computers and Technology
2 answers:
lakkis [162]4 years ago
5 0
I would say save as I beleieve
Paha777 [63]4 years ago
3 0
Save As, or Save A Copy.
You might be interested in
Any changes done to the software during the operational phase of the software before project wind up is called as maintenance. S
ruslelena [56]

Any changes done to the software during the operational phase of the software before project wind up is called as maintenance is a false statement.

<h3>What are operational phases?</h3>

The operational phase is known to be that phase in course of the making or construction where a given flow of the stresses is known to be mad in the medium via which the tunnel advances that is deviated.

Hence, Any changes done to the software during the operational phase of the software before project wind up is called as maintenance is a false statement because any change that is made to the software after it is deployed is known as maintenance.

Learn more about software from

brainly.com/question/28400365

#SPJ1

5 0
2 years ago
Four actions that can be implemented on a database to autocorrect violations of referential integrity, and the outcomes of the a
Paraphin [41]

Answer:

Follows are the matching to this question:

Option \ a \to \ Option \ 3\\\\Option \ b \to \ Option \ 4\\\\Option \ c \to \ Option \ 1\\\\Option \ d \to \ Option \ 2\\

Explanation:

While time-consuming or prone to errors mechanical adjustments to both the referential, databases could be configured with four measures to engine violations. The restricted action causes the insert, update, and removes to only be denied. Set Null to NULL sets the invalid external key, whereas Set Default to a specific core consideration specified in SQL sets a default foreign key. Its Cascade operation spreads the main changes in external keys.

6 0
3 years ago
Mention two hardware groups​
mars1129 [50]

Answer:

input Devices, Processing Devices, Output Devices, Memory/Storage Devices

Explanation:

4 0
3 years ago
Often duties and taxes are imposed on cars that are imported fron other countries. What type of incentives are these duties and
Kipish [7]

These duties and taxes are charged on imported cars in order to incentivize the people to purchase vehicles built in the home county instead.

6 0
3 years ago
What is a key function of a scrum master plato answer plz
sdas [7]
The scrum master is the team role responsible for ensuring the team lives agile values and principles and follows the processes and practices that the team agreed they would use.
6 0
3 years ago
Other questions:
  • When you use the ip address of the web server, the correct site is displayed?
    15·1 answer
  • You should use html elements instead of server controls when
    11·1 answer
  • Reading for subject content follows the same steps as reading for entertainment. True or false.
    10·2 answers
  • Write a program that prompts the user to enter the year and the first three letters of a month name (with the first letter in up
    8·1 answer
  • An extranet is like an intranet except that it allows company employees access to corporate Web sites from the ______
    13·1 answer
  • Write a program with a method computeCommission which takes a double that is the salesAmount and returns the commissions for sal
    9·1 answer
  • the default name for the small icon that represents a web site or page, and is displayed in the browsers, typically at the begin
    9·1 answer
  • There are types of templates​
    5·1 answer
  • what is the term for software that is exclusively controlled by a company, and cannot be used or modified without permission?
    6·1 answer
  • Different the policies and protocols in the industry
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!