1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
WITCHER [35]
3 years ago
15

Three periods after a menu item (...) mean that clicking that command will open

Computers and Technology
2 answers:
erastovalidia [21]3 years ago
7 0

I think its B.) A dialog box


san4es73 [151]3 years ago
7 0

i think it is bdbdbbfjdd

You might be interested in
Which of the following is another term for a subfolder​
marin [14]

Answer:

below

Explanation:

subdirectory

5 0
3 years ago
Identify 5 internal and external hardware components of a server
UNO [17]

Answer:

Internal:

#CPU; That retrieves &execute instructions.

#Modem; Modulates& demodulates electric signals.

#RAM;Gives application a place to store &access data on a short time periods.

External:

#Mouse; Transmits commands and controlling movements.

#Moniter; Device used to display video output from computer.

#Printer; Accepts text, graphics to the paper.

Explanation:

Hope this will help you.

5 0
2 years ago
A common attack in which a client's cookies, security tokens, or other personal information is obtained and used to impersonate
o-na [289]

Answer:

Identity Theft. i hope this helps :D

5 0
3 years ago
Which of the following functions of Information Security Management seeks to dictate certain behavior within the organization th
Dmitriy789 [7]

Answer:

The correct answer to the following question will be Option B (Policy).

Explanation:

  • The Policy is a systematic set of rules for driving policies and obtaining rational results. It is a declaration of intent and is applied as a process or protocol.
  • Policies are usually implemented by the governing body throughout the corporation.
  • It was the feature of Information assurance management, which sought to dictate those activities throughout the organization via a collection of institutional requirements.

Therefore, Option B is the right answer.

7 0
3 years ago
When you _____ a workbook, you control the ability users have to make changes to the file?
ehidna [41]
<span>When you protect a workbook, you control the ability users have, to make changes to the file.  This is t</span><span>o prevent other users from making changes, functions like adding, moving, deleting, or hiding worksheets, and renaming worksheets, you can </span>protect<span> it </span><span>with a password. </span>
5 0
3 years ago
Other questions:
  • Which command would you use to move a file from one location to another?
    6·2 answers
  • The following declaration appears in a program: short totalPay, basePay = 500, bonus = 1000; The following statement appears in
    9·1 answer
  • With a(n) ____ structure, you perform an action or task, and then you perform the next action in order.
    6·1 answer
  • Trading your bicycle for a snowboard exemplifies ?
    15·1 answer
  • The variable used in a loop to control the number of times it is executed is called a _______.
    10·1 answer
  • What is the most common concern with using variable frequency drives?
    6·1 answer
  • In pseudocode you can use the _________ library function to determine whether a character is an alphabetic letter.
    12·1 answer
  • If you need some one to talk to you can talk to me
    13·2 answers
  • Write a paragraph discussing privacy issues on the internet<br> and their impact on human lives.
    9·1 answer
  • How does digital and hybrid computers differ in portability​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!