1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
In-s [12.5K]
3 years ago
13

How do I copy and paste equations and pictures like math graphs, to post on this site to help get my questions answered?

Computers and Technology
2 answers:
rodikova [14]3 years ago
8 0

Save as picture and then use the attach file icon (circled in red) shown in picture below. alternatively use equation and symbols (circled with blue).


Mandarinka [93]3 years ago
5 0
Screenshot the math problem and attach it here
You might be interested in
Need help asap<br> give the correct answer!!
blagie [28]
It’s either b or c, but my final answer would be C
4 0
2 years ago
Read 2 more answers
WILL GIVE BRAINLIEST TO HELPFUL ANSWERS!
sashaice [31]

Algorithm is part of computer science. You an learn it on Khan academy. (you probably werent looking for this but no one was answering)

7 0
3 years ago
Problem 1. MST - Prim's and Kruskal's algorithms
Juli2301 [7.4K]
Or maybe not Encryption converts the data in a database to a format that is indecipherable to unauthorized users who attempt to bypass the DBMS.

a. True
b. False
7 0
3 years ago
Please help! It’s about coding and I’m not doing well on this topic. So i need a little help
levacccp [35]

Answer : Actionscript is for animation

JavaScript is for adding functionality to a webpage

DHTML is incorporating other languages into HTML

XML is used to store data

HTML is used to create a web page

Explanation:

6 0
2 years ago
Give two reasons why network security is the most important issue regarding data centers.
deff fn [24]
Three key concepts of security are integrity, confidentiality, and availability.

Network firewalls are the first line of defense, intended to keep intruders out. Once a system is compromised, all of its data can be accessed, and if a bad actor gains access to one system, they effectively have access to all of the systems. This touches on both system integrity and data confidentiality.

Security is also related to availability, or uptime. If your network is compromised, it may be inaccessible to those who need to use it, making it useless. If I'm working from an office in Chicago, and the company's main DC is in Atlanta, I need the network to remain available to access critical files.
7 0
3 years ago
Other questions:
  • andy accidentally saved a file in the wrong folder. what is the quickest way to move the file? create a new file and save it in
    8·2 answers
  • Why is it important to verify a customer complaint?
    6·1 answer
  • Which of the following is not a type of user account? A. Administrator b. Guest c. Group d. Standard
    10·1 answer
  • What will be the values of ans, x, and y after the following statements are executed? int ans = 35, x = 50, y =50; if ( x &gt;=
    7·2 answers
  • __________ is a very simple form of lossless data compression in which runs of data (that is, sequences in which the same data v
    6·1 answer
  • Describe the process of normalization and why it is needed.
    12·1 answer
  • What console can be used to enable disable start or stop a service
    6·1 answer
  • Help I need the code for In and out Milky Way in CoderZ
    6·1 answer
  • Please help me please it's urgent​
    6·1 answer
  • explain why the database system would not allow a tuple to be inserted into the database through this view
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!