1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marissa [1.9K]
3 years ago
12

Does any one know how to get an image from another site pasted onto this site?

Computers and Technology
1 answer:
elixir [45]3 years ago
3 0
You're not supposed to copy things from other sites so it won't be easy to do. But you can save the image to your computer then upload it here using the paperclip icon. 
You might be interested in
What is responsible for coordinating a computer's hardware and software components?
Yuri [45]
Control unit is responsible for coordinating a computers hardware and software components.
control unit is circuitry that directs operations within a computers processor. It  works by receiving input information that it converts into control signals,which are then sent to the central processor.The computers processor then tells the attached hardware what operations to carry out.

8 0
4 years ago
True or false with reason :- carriage inword is carriage on purchases​
Vlada [557]

Answer:

True

Explanation:

Carriage on purchases is carriage inward. Explanation: Carriage inwards refers to the transportation costs required to be paid by the purchaser when it receives merchandise it ordered with terms FOB shipping point. Carriage inwards is also known as freight-in or transportation-in.

:)

8 0
3 years ago
Which function of InfoSec management encompasses security personnel as well as aspects of the SETA program?
inessss [21]

Answer:

People

Explanation:

Information security management provides a description of the controls needed by an organization in order to ensure that it is capable of protecting the integrity, availability, and confidentiality of assets from security vulnerability and threats. On the other hand, the SETA program is three phased and ensures that organizations address and implement training and techniques for information security. Hence the only function that encompasses security personnel as well as aspects of the SETA program is the People function.

8 0
4 years ago
1) The critical path of a network is the A) shortest time path through the network. B) path with the fewest activities. C) path
german

Answer:

D

Explanation:

source

https://hbr.org/1963/09/the-abcs-of-the-critical-path-method

7 0
3 years ago
How many typefaces should you use in business documents?
Assoli18 [71]
It’s best to use two
5 0
3 years ago
Read 2 more answers
Other questions:
  • Which program has an indexed version of the NIST NSRL of MD5 hashes that can be imported to enhance searching for and eliminatin
    10·1 answer
  • The _____ text wrapping option wraps text around the object, with the text forming to the shape of the object.
    14·1 answer
  • Consider a class called Rocket that has a private instance variable called Engine. You are writing a "getter" for the Engine. Us
    7·1 answer
  • Suppose you define a java class as follows: public class test { } in order to compile this program, the source code should be st
    14·1 answer
  • Welcome back to school people!
    15·2 answers
  • A ________ is a gateway service that permits users to log in once, with one specific user ID and password, to gain access to mul
    8·1 answer
  • Which changes should be made to establish and maintain formal writing conventions? Select two options.
    10·1 answer
  • Writa function to read content from "Zone. txt" and write it into another file "zone1. txt" by reversing each line if the line s
    15·1 answer
  • Spoderman memes<br> im scared-
    15·2 answers
  • In binary, if there is a 1 in the 1s place the number is always
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!