1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexgriva [62]
3 years ago
8

In internet explorer, you can select options in the print dialog box by clicking the print button arrow on the ____ bar and then

clicking print.
Computers and Technology
1 answer:
AfilCa [17]3 years ago
8 0
Its the file button, i could be wrong if the internet explorer has been updated, but i know that the file button is the right answer.

You might be interested in
What's wrong with these codes in code HS Karel challenges(7.1.2. Racing Karel) Codes: //Below is the program that have Karel mov
Viktor [21]

Answer:

The program only runs 5 five since the for loop statement is limited to loop only five times.

Explanation:

In programming, a for-loop statement is used to repeat a collection of events a definite number of times. The number of loops is specified and compared with a variable to execute a block of code.

The for-loop statement in the code above declares and initializes a variable "i" to zero, runs the block of code, and increments by one if it is less than 5.

To make it run eight times, the value five should be changed to 8 instead.

5 0
3 years ago
In order to allow communication between vlans for exchange of data what must be used?​
lana66690 [7]
<span>In order to allow communication between vlans for exchange of data what must be used?

Router must be used</span>
4 0
3 years ago
Use the distributive property to expand the following expression. (9m - 6)7
Nady [450]
(9m - 6)7
(9m × 7) - (6 × 7)
63m - 42
7 0
4 years ago
Read 2 more answers
What elements are needed in a workstation domain policy regarding use of antivirus and malicious software prevention tools?
Reika [66]
The server should be able to block unauthorized access, a good firewall but still, enable those authorized to have an access. However, there should be security on vulnerable parts of the system that may lead to corruption and easy access to data thieves.
3 0
3 years ago
A doge is a shiba inu or probably a meme
Doss [256]
Yes the doge is a shiba
7 0
4 years ago
Read 2 more answers
Other questions:
  • ________ is typically used as the last string of letters in the name of a website. Group of answer choices the name of the indiv
    13·1 answer
  • What are multiple worksheets
    7·1 answer
  • Look at the circuit shown in the figure above. Switch S1 is open as shown, and R1 and R2 each have a value of 100 k. If you conn
    11·1 answer
  • When might be the best time to start saving for retirement?
    11·2 answers
  • Suppose that f() is a function with a prototype like this: void f(________ head_ptr); // Precondition: head_ptr is a head pointe
    15·1 answer
  • Que es un vlog? Cual es la diferencia entre vloc y papgina web? ​
    7·1 answer
  • The cafeteria offers a discount card for sale that entitles you, during a certain period, to a free meal whenever you have bough
    13·1 answer
  • Personal statements School leaver
    15·1 answer
  • Select the correct answer.
    11·1 answer
  • try the following code to see a nullpointer error (if you don’t see the error because of the autograding, you can copy it into t
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!