1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mashutka [201]
3 years ago
6

HELP PLLISSSSSSSSSS!!!!!!!!!! its unit test will mark as brainliest

Computers and Technology
1 answer:
astraxan [27]3 years ago
8 0

Answer:

1. file

2. true:false

3. prioitized

4. drafts

Explanation:

You might be interested in
Does the security burden fall primarily on the user? On
liubo4ka [24]

Answer:

yes and no because of the security

Explanation:

yes and no because of the security

6 0
3 years ago
You will start by doing a bit of research on viewfinders and LCD displays on digital cameras. After you feel that you have an un
Lemur [1.5K]

Answer:

SOMEBODY ANSWER IT

Explanation:

JESUS C

3 0
3 years ago
How do I insert a row in between 1 and 2 in excel?
Vlada [557]
This link should help: https://uhasct.com/insert-an-empty-row-between-each-row-of-data-in-excel/
5 0
3 years ago
Read 2 more answers
What is the name of the book farrah gray published in 2005??
seropon [69]
He wrote Reallionaire
8 0
3 years ago
What is the khan academy game where it is a block having to jump over lava and is an endless runner
saw5 [17]

Answer:https://www.khanacademy.org/computer-programming/lava-the-impossible-game-by-swax97/4638717300965376/embedded?id=1436456095000-0.5&origin=undefined&buttons=yes&embed=yes&editor=no&author=yes

Explanation:

5 0
3 years ago
Other questions:
  • Sarah's research shows that business information management professionals also perform the duties of other professionals. Which
    9·1 answer
  • Suppose that you created an robot that was so advanced it could act independently in very complex situations. It made its own de
    9·1 answer
  • Malware that corrupts the target operating system in such a manner that a network defender can no longer trust the native OS is
    15·1 answer
  • PLZ HELP ME! What is a false statement about online time?
    9·1 answer
  • Suppose you have an int variable called number. What Java expression produces the second-to-last digit of the number (the 10s pl
    15·1 answer
  • Create a file named homework_instructions.txt using VI editor and type in it all the submission instructions from page1 of this
    7·1 answer
  • Karin realized that a song takes up a lot more space on her computer than the lyrics of the song typed out in ms word document .
    12·1 answer
  • How to square a number in java.
    15·1 answer
  • Which keyboard shortcut would you press to copy cells that are selected in a spreadsheet?
    14·1 answer
  • What are the different elements of a window?​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!