1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bogdanovich [222]
4 years ago
5

Dragging or sizing affects only a ____.

Computers and Technology
1 answer:
il63 [147K]4 years ago
7 0
<span>Dragging or sizing affects only a "Selected Object." For example, an image, you need to click the image in order for you to select that image. The image is considered as an object. From the time you click on the picture, there are points visible where you can click and drag upon it nor resize.</span>
You might be interested in
Cryptography has requirements include:
ki77a [65]

Answer:

A

Explanation:

Cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents. ... When transmitting electronic data, the most common use of cryptography is to encrypt and decrypt email and other plain-text messages.

4 0
3 years ago
Which commas is used to combine two or more cells together into one cell
AURORKA [14]
The command is Merge & Center
This command could be easily found in the toolbar of your excel.
If you execute this command in two different cells, those cells will be merged into one larger cell and the content in that cells will be placed exactly in the middle of the combined cell (measures according to combined cells' length)
5 0
3 years ago
Because one memory location can be used repeatedly with different values, you can write program instructions once and then use t
CaHeK987 [17]

Answer:

True.

Explanation:

The statement written in the question is True.We can use one memory location and use it with different values.

For example:- When we are using a loop be it for,while or do-while.The counter that we use for iteration is one and we use that counter to run the loop.We are using a single memory location and we are updating the count in that memory location many times.

for(int i=0;i<1000;i++)

{

     //body.

}

We are using i's memory location and changing it 1000 times.

3 0
3 years ago
Input and output devices provide means of communication between computers and outer world<br>​
abruzzese [7]

Answer:

See explanation

Explanation:

This question seem incomplete as what's required was not stated.

To answer this question, I'll assume it's a fill-in-the-gap question

The definition given above describes computer peripherals.

Peripherals is one of the links between a computer user and the computer itself.

Through peripherals such as keyboards, mouse, light pen , one can send input into the computer.

In the same vein, one can get outputs through peripherals such as the computer monitor, speakers, printers, etc.

3 0
3 years ago
You are configuring the local windows firewall on your windows 7 computer. which network category needs to have the most stringe
marusya05 [52]
B because you need to have private
8 0
3 years ago
Other questions:
  • ________an approach to database and software development that emphasizes "individuals and interactions over processes and tools,
    12·1 answer
  • How do I turn of the noise canceling feature on my beats studio wireless?
    13·1 answer
  • Why do you need to back up important data?
    5·2 answers
  • In the accompanying figure, the split double arrow mouse pointer____.
    7·1 answer
  • Match the job roles with their appropriate qualifications
    15·1 answer
  • Write a class named Car that has the following fields: yearMode1. The yearModel field is an int that holds the car's year model.
    6·2 answers
  • Implement a function inValues() that asks the user to input a set of nonzero floating-point values. When the user enters a value
    7·1 answer
  • Please help me I need a help
    13·1 answer
  • How to turn robot voice like real human voice.
    6·1 answer
  • Ed wants to make sure that his system is designed in a manner that allows tracing actions to an individual. Which phase of acces
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!