1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valentinak56 [21]
3 years ago
9

The underline format will underline what?

Computers and Technology
2 answers:
aivan3 [116]3 years ago
8 0
The characters in the selected cell.
Juli2301 [7.4K]3 years ago
5 0
What you have highlighted
You might be interested in
Victor works for a telemarketing company that is on a very tight budget. He has been tasked with finding a method for the compan
snow_tiger [21]
I'd say a wiki was the best option for them. Anyone can edit it from anywhere, which is vital when no one's in the office at the same time and some work from home.
4 0
3 years ago
Read 2 more answers
Your friend Cameron’s little sister is visually impaired. Cameron is worried that his sister will not be able to use technology
IceJOKER [234]
All modern technology has things to help disabled people
5 0
2 years ago
A Cisco Catalyst switch has been added to support the use of multiple VLANs as part of an enterprise network. The network techni
Ostrovityanka [42]

Answer:

The technician should delete the startup configuration and the "vlan.dat" file residing in the flash memory of the newly added switch and lastly, he should reboot the switch.

Explanation:

In this scenario, a Cisco Catalyst switch has been added to support the use of multiple virtual local area networks (VLANs) as part of an enterprise network. The network technician finds it necessary to clear all virtual local area network (VLAN) information from the switch in order to incorporate a new network design. To accomplish this task successfully, the technician should delete the startup configuration and the "vlan.dat" file residing in the flash memory of the newly added switch and lastly, he should reboot the switch. The VLAN informations are stored in a file with the name "vlan.dat" residing in the flash memory of the switch.

However, in order to delete the startup configuration he would be required to login as an administrator, so as to have all privileges.

<em>Also, the essence of deleting the startup configuration and the "vlan.dat" is to avoid any conflict in the network. </em>

8 0
4 years ago
Which shortcut key aligns text to the center of the paige
borishaifa [10]

Answer:

ctrl e then ctrl r

Explanation:

i used google cause im a. gooooddddddddd

6 0
4 years ago
What is the main fuction of command interpreter​
Vikentia [17]

The command interpreter or the command-line interface is one of the ways a user can interface with the operating system. The command interpreter's main task is to understands and executes commands which it turns into system calls. The kernel is the central module of an OS.

<em><u /></em>

<em><u>_________________</u></em>

<em><u /></em>

<em><u>Brainliest would be greatly appreciated!</u></em>

<em><u>I found this!</u></em>

<em><u>_________________</u></em>

<em><u /></em>

<em><u>#SpreadTheLove</u></em>

<em><u /></em>

<em><u>#SaveTheTrees</u></em>

<em><u /></em>

<em><u>- Mitsu JK</u></em>

6 0
3 years ago
Other questions:
  • Jason is creating a webpage on the basic parts of a camera. He has to use a mix of both images and content for the web page to h
    11·1 answer
  • How do forensic pathologist determine time of death
    13·1 answer
  • 4+4 act quick for brainliest
    10·2 answers
  • Why do you classify computers?
    6·1 answer
  • Write the code for invoking a method named sendsignal. there are no arguments for this method . assume that sendsignal is define
    12·1 answer
  • Controlling access of information on the internet
    15·1 answer
  • Along a road lies a odd number of stones placed at intervals of 10 metres. These stones have to be assembled around the middle s
    12·1 answer
  • Which statement describing the arcade games played in the 1970s is true?
    14·1 answer
  • 1. Software that is designed to intentionally cause harm to a device, server, or network is A. outware B.loggerware C.
    12·1 answer
  • Old systems can be useful when designing new computer software.<br> True or False
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!