1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
weeeeeb [17]
3 years ago
9

Bullets in a text box will do which of the following?

Computers and Technology
2 answers:
11Alexandr11 [23.1K]3 years ago
6 0
B.) Help you present your data with concise statements.
Viktor [21]3 years ago
3 0
I believe this would be B
You might be interested in
What can be designed to create annoying glitches or destroy data
Yanka [14]
Viruses can cause this.
3 0
3 years ago
Describe two methods by which viruses can spread.
vlada-n [284]

Answer:

the two methods that can spread viruses are touching and breathing

Explanation:

When there are viruses being spread breathing near another person can caused it to spread because viruses can travel through air. if the viruse is in your systems coming out through the mouth is one way it can travel to another person. That's why wearing a mask is helpful

The other was is touching. Viruses can travel through physical contact. Is hands arent being wash regularly after eating brushing teeth etc it leaves germs and bacteria which is some of the ways and sometimes the main reason as to how viruses are made or created. That's why washing hands are important

Hope's this helps

6 0
2 years ago
True or False? As a digital citizen, you have the right to express your opinions online without consequences.
SCORPION-xisa [38]

Answer:

true but also false because u may be followed by the fbi

3 0
3 years ago
Read 2 more answers
How should we utilize our rights​
adell [148]

Answer:

Human rights also guarantee people the means necessary to satisfy their basic needs, such as food, housing, and education, so they can take full advantage of all opportunities. Finally, by guaranteeing life, liberty, equality, and security, human rights protect people against abuse by those who are more powerful.

Explanation:

6 0
3 years ago
Read 2 more answers
Write a program that inputs two characters first and second, and then prints all non-alphabetic characters starting from second
baherus [9]

Answer:

fbtcft gdfgfffff tvfft gxf

8 0
3 years ago
Other questions:
  • Frank has created a résumé and separated the sections using headings. How can he set the headings apart from normal text?
    13·1 answer
  • When you boot up a computer and hear a single beep, but the screen is blank, what can you assume is the source of the problem?
    11·2 answers
  • While you are working with a document using a program such as wordpad, the document is stored in ___________?
    15·2 answers
  • with the _______ network topology, reliability is the major advantage while high cost is the disadvantage.
    10·2 answers
  • A device (or a software program on a computer) that can monitor data traveling on a network is known as a socket sniffer. ______
    15·1 answer
  • You are configuring a switch that has three hosts attached to FastEthernet 0/2 through 0/4. All three hosts are part of a public
    10·1 answer
  • Lucy wants to develop a web page to display her profile. She wants to just start with a basic page that lists her accomplishment
    13·1 answer
  • Please help me
    10·1 answer
  • Question 1 (True/False Worth 3 points)
    8·1 answer
  • ABC company have lots of computer running window 7. But they are not thinking to upgrade a higher version of window. One of the
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!