1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kirill [66]
3 years ago
12

To place the caption at the top of the image you will need to change the_____ in the drop down menu

Computers and Technology
2 answers:
Varvara68 [4.7K]3 years ago
6 0
You're right, it's A.
iren2701 [21]3 years ago
4 0

Answer:

Yes its A

Explanation:

Hope this helps you! :D

You might be interested in
What programming language has dominated scientific computing over the past 60 years?
lord [1]

c++,  because it is considered as the mother of all programming languages. you can easily access other programming languages if you have a command on c++

7 0
1 year ago
A binary search algorithm is written (as in the modules, for example) which searches a pre-sorted array for some user-defined va
Mazyrski [523]

Answer:

c) it will always return with an answer of 7 or fewer comparisons of data.

Explanation:

As maximum number of comparison in worst case for sorted binary search is log₂n, here n = 100, so maximum search is at least 6.6 which is approximately 7.

4 0
3 years ago
I don’t understand the double8 coding problem. It is Java
sergeinik [125]
Ask someone who knows about this stuff this is weird I would say look it up maybe
7 0
3 years ago
Bestie give me some r username ideas​
Anna71 [15]

Answer:

magic school bus dropout

5 0
3 years ago
Read 2 more answers
A stealth network attack in which an unauthorized person gains access to a network and remains undetected for a long time is ref
polet [3.4K]

Answer:

"Advanced persistent threat " is the right one.

Explanation:

  • APT seems to be a clandestine cyber assault on something like a network connection where another assailant achieves and retains unauthorized knowledge to the communication network, however impossible to conceive for a considerable period.
  • They represent compound channel assaults that use different components including various approaches of attack.
6 0
3 years ago
Other questions:
  • Which statement is NOT true:
    9·1 answer
  • Hypertext Markup language (HTML) version _____ added support for style sheets to give web designers greater control over page la
    12·1 answer
  • What are the useful techniques in program design?
    12·1 answer
  • As an improvement of the ATX form factor over AT, shorter wires made it easier to shield them and made them capable of handling
    6·1 answer
  • To remove an embedded chart, you should _____ it and press the DELETE key. (Points : 2) move drag hide click
    15·1 answer
  • Is it more costly to Andrew to go to graduate business school full time or part time if the tuition is the same for each? A. Par
    5·2 answers
  • Nia is editing a row in an Access table. The row contains the Pencil icon on the left end of the record
    12·2 answers
  • Write a program to simulate a Fruit Machine that displays three symbols at random from Cherry, Bell, Lemon, Orange, Star, Skull.
    11·1 answer
  • HELP ASAP, AND YES I KNOW, WRONG CATEGORY. SORRY!
    10·2 answers
  • The objective fuction of linear progrmming should be
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!