1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
melomori [17]
3 years ago
14

What aspect should you consider before adding pictures to a document? You should structure the (blank) first before you search f

or a relevant picture.
Computers and Technology
1 answer:
Evgesh-ka [11]3 years ago
7 0
I would be considering type of files that do not take up a lot of space, especially if you plan to email them
You might be interested in
IF YOU GET 5/5 RIGHT YOU WILL GET BRAINLIEST AND 50 [POINTS
natta225 [31]

Answer:

The sort function

Explanation:

Because it will sort all the numbers.

4 0
2 years ago
Read 2 more answers
The tcp/ip ____ layer commonly uses the transmission control protocol (tcp) to maintain an error-free end-to-end connection.
aleksklad [387]
The answer would be the TCP/IP Application Layer.
6 0
3 years ago
COULD U ANSWER THIS ???
vladimir1956 [14]

Answer:

B.lightning striking a tree

Explanation:

The crowd dispersing in all directions is not a closed-loop by any means, and students jogging around an oval track as well is not a closed-loop, and also not a cross country run from one point to another. However, the lightning striking a tree is a closed loop that best models a circuit. And as lightning strikes the tree, like a closed circuit, tree catches the fire, or in circuitry words, the current is generated, and tree catches the fire due to it, just like bulb starts glowing.

3 0
3 years ago
What does this mean?
finlep [7]

Answer:

This is a QR-Code

Explanation:

A QR code is a type of matrix barcode.

When you scan with a smartphone it should give/bring you to a link to give you access to a special link orphoto and ETC.

7 0
2 years ago
Read 2 more answers
Sending packets with false ip source addresses is called ____. ip address spoofing a port scanning attack a ip address scanning
Eddi Din [679]
<span>Sending packets with false IP source addresses is called </span>IP address spoofing 
6 0
3 years ago
Other questions:
  • How to Ctrl + shift + F4 but in a HP laptop?​
    8·2 answers
  • The Glow effect adds a blinking border around a chart.<br> t or f
    15·1 answer
  • What is intellectual property?
    13·1 answer
  • Andy is trying to put together a holiday gift knapsack (with W=8) for Sarah. He has n items to choose from, each with infinitely
    15·1 answer
  • Anthony is responsible for tuning his organization's intrusion detection system. He notices that the system reports an intrusion
    8·1 answer
  • For a typical middle-income family, what is the estimated cost of raising a child to the age of 18?
    11·1 answer
  • This is really not a question but yall should texts me I need friends:))
    9·2 answers
  • Charlie makes pizza at a restaurant. The customers always compliment how great the pizza tastes. But Charlie takes a long time t
    7·2 answers
  • __________ can collect information about credit card numbers.
    15·2 answers
  • In which number system do the digital computer work​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!