1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adelina 88 [10]
4 years ago
9

Having used the color gallery to change the color of a graphic, with the graphic selected, tap or click ____ in the color galler

y to change a graphic back to its original color.
Computers and Technology
1 answer:
Maurinko [17]4 years ago
4 0
It should be "no recolor" 
You might be interested in
What products use fabric manipulation
Komok [63]
The fabric satin is good for fabric manipulation.
8 0
3 years ago
Once you have a listing of every unique combination of salesperson, product and location, what Excel function would you use to c
andre [41]

Answer:

SUMIFS

Explanation:

As we know that the excel is used to present the data in a very attractive way by applying the formulas, pie charts, functions as a pivot table, goal seeking, macros, etc

In order to determine the total sales for each and every sales person, production and location combination we use the SUMIFS function so that the total of each column could come in an easiest and better way

7 0
3 years ago
What are experts in technology who use their knowledge to break into computers and networks, for profit or just as a challenge k
insens350 [35]

Answer:

Hacker

Explanation:

Hacker -

It refers to the computer software expert , who is responsible to break into the unauthorized networks or computer , is referred to as a hacker .

The hacker is skilled with exceptional computer and computer software knowledge .

Hacking is an illegal practice , as the person is able to access some confidential and personal data and information of any other person or organisation .

Hence , from the given information of the question ,

The correct term is hacker .

3 0
3 years ago
reagan's firm has not had to make large investments in computer or networking hardware or in personnel to maintain the hardware
Kaylis [27]

The usage of hosted services such data storage, servers, databases, networking, and software through the internet is referred to as cloud computing.

Since the advent of cloud computing, the number of cloud-based IT services and apps has exploded around the globe and is still growing. By 2021, practically all of the small and major applications we use will be stored in the cloud, saving us money, time, and storage space. The sorts of cloud computing are covered in this article, along with ten trends to look out for in 2021. The back-end layer is composed of computers, servers, central servers, and databases, as well as software. This layer, which is the foundation of the cloud, is only in charge of safely storing data.

Learn more about database here-

brainly.com/question/6447559

#SPJ4

6 0
1 year ago
Television, the internet, and smartphones are different communication _______blank hsn uses in its imc.
Sati [7]

Answer:

serivices

Explanation:

7 0
1 year ago
Other questions:
  • Where should a user disable virus protection settings that might prevent the boot area of the hard drive from being altered?
    10·1 answer
  • A(n) __________ port, also known as a monitoring port, is a specially configured connection on a network device that is capable
    13·1 answer
  • Select the correct answer from each drop-down menu.
    10·2 answers
  • Discribe two ways you can zoom in and out from an image
    9·2 answers
  • What's the smallest part of a computer
    8·2 answers
  • How do you copy a file​
    9·1 answer
  • How can you categorize computer on the basic of its brands.​
    10·1 answer
  • write an expression taht evaluated to true if and only if the variable s does not contain the string 'end'
    12·1 answer
  • A small network that consists of devices connected by Bluetooth, such as a smartphone and a computer, is referred to as a ______
    14·1 answer
  • Cyber vulnerabilities to dod systems may include
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!