1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ivanzaharov [21]
3 years ago
10

Christine would like to add something to her document that will illustrate the text. She should _____.

Computers and Technology
2 answers:
Arisa [49]3 years ago
8 0
Idk? help me out its brayson 
Musya8 [376]3 years ago
7 0

Answer:

The answer to the following question is the option "insert a graphic".

Explanation:

In this question, the answer is "insert a graphic".

In any document, if it contains only text. So it will be boring to read.  

To avoid this problem she must insert a graphic on her document.

For doing this she would able to explain the question more easily. and people would attract to know about the topic.

You might be interested in
Omar’s teacher has asked him to send her a PDF copy of his presentation via email.
Vadim26 [7]

Answer:

1. Export

2. Create PDF/XPS document

3. Standard

4. Click Publish

Explanation:

I got wrong on edg and found the correct answer

8 0
3 years ago
Artie believes that all Asian people are more intelligent than other people. Artie is engaging in?
Luden [163]
Artie is Stereotyping
5 0
3 years ago
Read 2 more answers
How to build a 5*32 decoder by using 3*8 and 2*4 decoders? (digital design)
quester [9]
Assuming decoders with enabler.
input with rectangle is the ENABLE input.
wire with "/" on it is a bundled wire with multiple values to save drawing space.
In1 is MSB, In5 is LSB.

messy drawing as I'm in vehicle.

8 0
3 years ago
Which of the instances below is an example of a Trojan horse? Question 2 options: a) An attachment in an email that is really a
sergij07 [2.7K]

Game-theif Trojans is the malware that makes a backdoor into your email account by which you are playing a game or has downloaded it and thus by this all information of user is exposed.

So option D is the answer.

Option A cannot be answer because Trojan does not use files for its purpose.

Option B cannot be a good option because Trojan works in online could.

Option C cannot be a option because Trojan does not need executable to attack your account.

3 0
3 years ago
Read 2 more answers
31. With interactive marketing,
stepan [7]

Answer:

D.

Explanation:

Interactive marketing is a technique in which marketers focus on one-to-one interactions with individual customers as opposed to focusing on the entire population. This shapes the marketing decisions based on the behaviors and preferences of the customers. Therefore with interactive marketing, the buyer controls the kind and amount of information received from the seller.

6 0
3 years ago
Other questions:
  • Which sector provides scope for multimedia designers?
    10·1 answer
  • What is the term for an e-mail server program that receives sent messages and delivers them to their proper destination?
    14·1 answer
  • Given that the array monthSales of integers has already been declared and that its elements contain sales data for the 12 months
    6·1 answer
  • State and derive the law of conservation of energy​?
    8·2 answers
  • Building relationships during your career exploration is called A. clustering. B. futurecasting. C. matchmaking, D. networking.
    9·2 answers
  • How to get free PS5?
    8·2 answers
  • Complete the code to create a new file.
    6·1 answer
  • Tape is magnetic tape which sound ca be recorded , true or false?
    9·1 answer
  • WILL CHOOSE BRAINLIEST! in cells D6 through D8, enter formulas to calculate the values of the stocks. The formulas should multip
    6·1 answer
  • the advertisement below is an example of a(n) the advertisement below is an example of a(n) informative advertising objective pe
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!