1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alenkasestr [34]
3 years ago
8

Alicia would like to make important text in her spreadsheet stand out. Alicia should _____

Computers and Technology
2 answers:
Airida [17]3 years ago
4 0
Probably bold the important text? Its hard without multiple choice
julsineya [31]3 years ago
3 0
Make it bigger or bolder to make it more noticeable to the eye. Have a nice day. 

-Rosie

Like so: Bold Text. 
You might be interested in
Terry visits the website www.examplewebsite.org. What can you gather about the site from the domain?
Alja [10]
Answer: B

Explanation: This question asks the student to consider the domain .org. The student needs to know that org is short for organization. This would point to option B. For option A to be true, the domain would need to be .com. Option C and D couldn’t be true, as there is no domain to point to these options. For option E to be true, the domain would need to be .gov.

Hope this helps! Comment below for more questions.
3 0
3 years ago
Distinguish between secondary storage device and primary storage device
Ede4ka [16]

Answer:

Primary storage refers to the main storage of the computer or main memory which is the random access memory or RAM. Secondary storage, on the other hand, refers to the external storage devices used to store data on a long-term basis.

3 0
3 years ago
Technologies that function within the established system are called
vesna_86 [32]
<span>Authorizing technologies are technologies that controls the use of system and network resources through authentication and authorization. 
</span><span>Enabling technologies are innovation technologies that drive radical change in the capabilities of a user or culture.
</span>Obstructing technologies include blocking<span> and filtering, content manipulation, attacks.
</span>Preemption means "prior seizure of" and preemptive technologies <span>take control of the operating system from one task and giving </span>it<span> to another task.
</span><span>Technologies that function within the established system are called enabling technologies.</span>
8 0
3 years ago
Evan is borrowing a friend's laptop to check out some groovy music files. What can Evan look for to quickly identify
Yuki888 [10]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct option for this question is the file extension. Because, by knowing the file extension, you can easily understand and know what the file is. If Evan checking out some groovy music files then he will definitely look at the file format to know that is it the music file or not.

Other options are not correct because:

messaging app function is to send the message, receive and store the message while hardware does not have any relation to identifying the music file and system software is an example of an operating system that also does not help the Evan for looking at music file on the laptop.

7 0
3 years ago
Can you help me with these AP Computer Science Questions. (THIS IS DUE BY 1:30 PM today) you have to evaluate the Boolean Expres
vfiekz [6]

Answer + Explanation:

'and' -> both statements are 'True' to evaluate as 'True'.

'or' -> at least one statement is 'True' to evaluate as 'True'.

1. True (grade has the value of 82, so the statement evaluates to 'True').

2. True (Both statements are true, this expression evaluates to 'True').

3. False (Both statements are false, this expression evaluates to 'False').

4. True (the != operator means <em>not equal.</em> Since the 'name' variable holds the string 'Rumpelstiltskin', name != 'Rumpelstiltskin' evaluates to 'False'. The 'not' operator returns the opposite of the given Boolean expression, so this expression evaluates to 'True').

5. True (name == 'Rumpelstiltskin' evaluates to 'True', so this expression is true).

6. False (All statements evaluate to 'False').

7. True (All statements evaluate to 'True').

8. False (All statements evaluate to 'True' except for <em>not(x == - 3) </em>which evaluates to 'False', so the whole statement now becomes false).

9. True (<em>grade+5 < 90 and grade >= 80 </em>evaluates to 'True', so this whole expression becomes true).

10. True (<em>grade > 0 and x % 2 == 1 </em>evaluates to 'True')

Hope this helps :)

7 0
3 years ago
Other questions:
  • Write a function decimalToBinaryRecursive that converts a decimal value to binary using recursion. This function takes a single
    11·1 answer
  • If you are feeling sick and you want to drive somewhere, you should
    12·2 answers
  • Your task is to improve a multi-threaded program that frequently writes small entries to a shared file by introducing a layer th
    7·1 answer
  • Write a pseudocode algorithm which asks the user to enter a password.if the user enters “NotAtHome” then print “welcome”
    15·1 answer
  • Write a program that dynamically allocates an array large enough to hold a user-defined number of test scores. Once all the scor
    5·1 answer
  • An actual printout of computer data always satisfies the best evidence rule?
    12·1 answer
  • _____ parser is an LL parser that is implemented by writing code directly from the grammar of the source language. EBNF is ideal
    7·1 answer
  • Many companies ban or restrict the use of flash drives
    11·1 answer
  • Question 1 (1 point)
    9·2 answers
  • Your design company needs to create a sample animation for a client very quickly. You already have the basic graphics, and the c
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!