1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ivanzaharov [21]
3 years ago
10

Christine would like to add something to her document that will illustrate the text. She should _____.

Computers and Technology
2 answers:
Arisa [49]3 years ago
8 0
Idk? help me out its brayson 
Musya8 [376]3 years ago
7 0

Answer:

The answer to the following question is the option "insert a graphic".

Explanation:

In this question, the answer is "insert a graphic".

In any document, if it contains only text. So it will be boring to read.  

To avoid this problem she must insert a graphic on her document.

For doing this she would able to explain the question more easily. and people would attract to know about the topic.

You might be interested in
Linda wants to apply for a job in a company of her choice. Which information would her potential employers likely review in her
Lemur [1.5K]
The answer is A. Comments about her past job and work performance.
4 0
3 years ago
Read 2 more answers
JAVA<br>plzz help...............​
patriot [66]

Answer:

import java.util.Scanner;

import java.util.Arrays;

public class Main {

 public static void main(String[] args) {

   Scanner scan = new Scanner(System.in);

   int numbers[] = new int[3];

   System.out.print("Enter first number: ");

   numbers[0] = scan.nextInt();

   System.out.print("Enter second number: ");

   numbers[1] = scan.nextInt();

   System.out.print("Enter third number: ");

   numbers[2] = scan.nextInt();

   scan.close();

   Arrays.sort(numbers);

   if (numbers[0] == numbers[2]) {

     System.out.println("All the numbers are equal");

   } else {

     System.out.printf("Greatest number: %d\n", numbers[2]);

   }

 }

}

7 0
3 years ago
Need help please asap
Nitella [24]

Answer:

Its C that is the answer hahahahha

6 0
3 years ago
The features used be of Computer that tell, it every field.​
Ierofanga [76]

Answer:

Versatility

Explanation:

The capacity of computer of performing more than one task at the same time is called versatility of computer. Versatility means the capacity to perform different types of work completely

6 0
2 years ago
Explain three specific &amp; major security threats to internet users. In each case, address whether or not the vulnerabilities
kherson [118]

Answer:

See explaination

Explanation:

We already know that people all over the world are using the internet to communicate with each other to store their personal data, for the entrainment working in internet, doing online shopping and a lot of things. The user can faced with many threats. These threats are of different form.

The listed and explained below are some of the threats;

a) Compromised browser:-

Most popular browser are targeted and any security flaws exploited immediately. Criminals uses the flaws to gain access to sensitive document and shadow users browsing activity.

Phishing:-

Phishing is simply referring to the spam email or websites. Most times it is used to steal ones data, identity and funds. It looks genuine, this is what makes it hard to detect .

Poisoned websites:-

These are the fake link with hidden malware where the malware creator create a juicy news /video link which attract the user but the destination affect the PCs and the PC give a big virus alert and then compelled a visitor to be aware of the malware.

Misused social media sites:- These are often used in work place these are misused to spread Trojans and malware User download file and put the corporate network at risk .

These threats are not meaningful to the internet of Things (IOT) but there are different things like if you have a CCTV camera and it is connected to internet so by the threads anyone can take control over the cameras it can shut down the camera delete the recording of the camera and other things. There are the other threats.

7 0
3 years ago
Other questions:
  • Question: Henry wants to change the configuration information of an application. Which file should Henry edit to change this inf
    15·1 answer
  • Wich of these is an example of magnetic storage
    11·1 answer
  • To build a user interface that contains graphical components, the components ____. must each be added to a separate panel. must
    7·1 answer
  • Write a while loop that adds the first 100 numbers (from 1 to 100) together. To do so, use a while loop that continues while the
    12·2 answers
  • Create detailed pseudocode for a program that calculates how many days are left until Christmas, when given as an input how many
    15·1 answer
  • My friend Leo wants to have an emergency plan for his final exams on University of Southern Algorithmville. He has N subjects to
    6·1 answer
  • 334. Universal Containers uses a custom field on the account object to capture the account credit status. The sales team wants t
    12·1 answer
  • What dd command would you use to copy the contents of a partition named /dev/drive1 to another partition, called /dev/backup?
    6·1 answer
  • Create a vector of structures experiments that stores information on subjects used in an experiment. Each struct has four fields
    12·1 answer
  • You are developing a Website that is going to be viewed extensively on smartphones and tablets. Which of the following should yo
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!