1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitry_Shevchenko [17]
3 years ago
11

The HATCH command is found on which panel to the Home tab to the AutoCAB ribbon?

Computers and Technology
1 answer:
Agata [3.3K]3 years ago
3 0

The answer is B) Draw


You might be interested in
Which line of code will use the overloaded multiplication operation?
maks197457 [2]

Answer:

def __mul__(self, b):

Explanation:

correct edge 2021

4 0
3 years ago
Give the name and the syntax of the HTML Tag which is <br><br>used for creating a Hypertext Link.​
Annette [7]

Answer:

<a href="enter_site_url_here">Click here to visit site!</a>

Explanation:

href is the link that the element is going to point towards. Meaning it's going to direct the end-user to that site. "Click here to visit site!" is the text that the element is going to say, and that text will have an underline. So it's best to keep it short as you don't want <u>something like this happening on your site</u>.

I'd stick with the classic "here" as the text and have the text before-hand say "Click" and after-hand say " to visit site X" with X being the site name. Or, something along those lines.

8 0
3 years ago
What are the charactaristic of computer with virus​
NISA [10]

Explanation:

One of the main characteristics of computer viruses is related to the fact that they are programs created by hackers that attack the code of a computer, infecting files on the computer's hard drive or its source code. Once the virus has been copied onto the computer, it can contaminate other computers that come into contact with the machine.

5 0
3 years ago
Read 2 more answers
You shut down VM1, configure the processor compatibility settings, and then start VM1. Does this meet the goal?
Naddik [55]

Answer:

Yes it does.

Explanation:

VM or virtual machines are enabled by the hypervisor in host operating systems. More than one virtual machine can run in an operating with only one processor.

Live migration, save and restore, and production checkpoints are all mobility processes that does not require rebooting the system. Since these virtual machine mobility processes is not compatible running directly on different processor, the virtual machine must be shutdown, and rebooted on the new processor host.

However, to run the virtual machine on a different processor without rebooting, the VM is run on processor compatibility mode (in the processor compatibility settings).

7 0
3 years ago
We all interact with various information systems every day: at the grocery store, at work, at school, even in our cars (at least
Serhud [2]

Explanation:

An information system can be defined as an automated system or not, which is used for the purpose of collecting data and transforming it into relevant information for a given purpose.

Currently, information systems are increasingly used in the organizational environment, for example, as management information systems and decision support systems, which are automated computer systems that provide greater support to a manager's work, due to the amount of data that store and process relevant information to assist in the speed of the decision-making process, since information systems are able to capture a volume of data and analyze it, create standards, find flaws and transmit essential information that makes the manager's work more facilitated and improved.

8 0
3 years ago
Other questions:
  • An effective technology for e-training and e-learning is __________, which uses computer graphic displays that the user can adju
    12·1 answer
  • What two images did you have to add to the wds server to handle the windows installation?
    7·1 answer
  • 1. Itemise the order in which BASIC executes arithmetic operation.
    13·1 answer
  • Please discuss what you consider to be some of the biggest challenges your company will face when working from the Linux command
    14·1 answer
  • Which approach does procedural programming follow? bottom up, top down, random, or object oriented​
    15·1 answer
  • Which professionals can benefit from an understanding of statistics? Check all of the boxes that apply. magician trying to locat
    5·2 answers
  • If you would like to give another user permissions on your mailbox or to particular folders within your mailbox, which role shou
    10·1 answer
  • When assigning a value to a string, which of the following rules needs to be followed?
    8·1 answer
  • _____ allows a function or operator to perform different tasks depending on the types of the arguments or operands. Group of ans
    10·1 answer
  • What is wrong with the following code?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!