1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ikadub [295]
2 years ago
7

When should you use a table in a document

Computers and Technology
1 answer:
Dominik [7]2 years ago
4 0

Hope this helps:

To show a group of information or numbers. I thing this works..... Hopefully

You might be interested in
What is an example of Big Data?
Y_Kistochka [10]

Answer:

providing real-time data feeds on millions of people with wearable devices

Explanation:

6 0
3 years ago
Which type of disease cannot be spread from one person to another
marusya05 [52]

<u>non-infectious, non-communable</u>. It means that they can't spread. I hope that helps! Also, and example of this non-infectious disease would be diabtetes, as in, if you're next to a person that has it, you won't get it lol.

6 0
3 years ago
Read 2 more answers
I Need Help With This I'm Just At Home Working And I Am Kinda Stuck On This Question Please Help
kvasek [131]

Answer:

move forward 300 pixels and turn right by 15 pixels

repeat then turn left instead of right

do this either 5 or 10 times idk which one

Explanation:

6 0
3 years ago
Tuesday
ale4655 [162]

Answer:

number 2 is the awnser(the mouse)

4 0
2 years ago
Explain the IT vendor selection and management processes
Reptile [31]

Answer:

The vendor management process includes a number of different activities, such as: Selecting vendors. The vendor selection process includes researching and sourcing suitable vendors and seeking quotes via requests for quotation (RFQs) and requests for proposal (RFPs), as well as shortlisting and selecting vendors. hope it helps

3 0
2 years ago
Other questions:
  • An object reference provides a(an)______for an object and is used to gain access to the object (Points : 2) entry
    11·1 answer
  • In five to ten sentences, explain what netiquette is and how it improves efficiency and productivity in the workplace.
    10·2 answers
  • If an attacker decides to implement a less obvious port-scan, or stealth attack, which of the following techniques would be appr
    14·1 answer
  • 2 Consider the sequence of keys (5,16,22,45,2,10,18,30,50,12,1). Draw the result of inserting entries with these keys (in the gi
    13·1 answer
  • In a linked chain implementation of a queue, the performance of the enqueue operation
    10·1 answer
  • WILL GIVEE BRAINLIEST ANSWER!!!!
    14·1 answer
  • 1. Do our shared social experiences lead us to think<br><br> communication is a cure-all?
    13·1 answer
  • Which of these is an example of a system?
    7·1 answer
  • Use python
    9·1 answer
  • explain why you can determine machine epsilon on a computer using IEEE double precision and the IEEE Rounding to Nearest Rule by
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!