1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ki77a [65]
3 years ago
12

Mr. Mathis asked his students to add a comment to a cell the students recorded the steps they followed in a chart. Which student

correctly inserted a comment
Computers and Technology
2 answers:
Goshia [24]3 years ago
8 0

Answer:

The answer is Raj

Explanation:

sergeinik [125]3 years ago
7 0

Where are the students name we can’t answer a question without all the main parts everyone knows that

You might be interested in
Only one person can receive the same email at the same time true or false
nasty-shy [4]

Answer:

false

Explanation:

5 0
3 years ago
Which is a common problem caused by the widespread use of computers?
Andru [333]
Hacking would be a widespread problem.
8 0
3 years ago
What are the benefits of automating a process? Choose all that apply.
taurus [48]

Answer:

All except It makes a company look modern.  

Explanation:

3 0
3 years ago
Timur was making a presentation regarding how attackers break passwords. His presentation demonstrated the attack technique that
kakasveta [241]

Answer:

The answer of the following question is Brute force attack .

Explanation:

A brute force attack is the error and trial method that is used by an application program to decode the encrypted data like passwords or the Data Encryption Standard (DES) keys, which through an exhaustive effort (by using brute force) rather than the employing an intellectual strategies.

7 0
3 years ago
Like when writing a paragraph, the subject becomes the __________ of the photograph.
Natali5045456 [20]
It is A, the theme is the subject.
8 0
3 years ago
Other questions:
  • Someone who is young, lacks funds, and really wants to gain technical skills while serving his or her nation should consider
    8·1 answer
  • Which method do software testers use to isolate new code from the rest of the network during the test stage of the software deve
    15·1 answer
  • American company Software Unlimited is planning to expand its operations to the Bangor Republic where the group is the primary u
    7·1 answer
  • The letters a, e, i, o and u are the only vowels. Write a function named vowelUseDict() takes a string t as a parameter and comp
    7·1 answer
  • Information is best described as
    10·1 answer
  • Unwanted email sent to large groups of people who did not request the communication is called _____
    12·1 answer
  • Which graphic file format is used for commercial purposes.
    10·1 answer
  • What does this mean? And how did I get it?
    12·2 answers
  • Which of the following is true about parallel computing performance?
    11·1 answer
  • (ATRCKALLB) __________is an input device that contains a movable ball on the top.​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!