1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
frutty [35]
3 years ago
10

When are number list generally used ?

Computers and Technology
1 answer:
Cloud [144]3 years ago
5 0
 Numbered lists are generally used when listing items that have an order of priority.
You might be interested in
A database is used to _____.
Cloud [144]
A database is used to organize a large collection of data, hence the name database. It is literally a base that would contain a chunk of data that a person or an organization will need to pull out later when they need it. Databases are usually used by companies or organizations
5 0
4 years ago
Read 2 more answers
Help please im not sure what this means T^T
Vesna [10]

Answer:

14

Explanation:

7 0
3 years ago
Read 2 more answers
A colleague has included you on an email that is irrelevant to you, but it continues to come to your inbox because people are us
Law Incorporation [45]

on google there is a mute function with the 3 dots on the top and outlook has it in the same location but under the word of "ignore"

7 0
3 years ago
Jack needs to create a technical drawing for a new tool.
Delicious77 [7]

Answer:

Jack should send an e-mail out to all of their clients and BCC them on it (so that they don't have each others information) and distribute the information quickly. E-mail is one fastest ways to get information sent to a large amount of people at one time

4 0
3 years ago
Read 2 more answers
Joe just joined a new team at his marketing firm, which has been working on a campaign ad for the new Elmo doll. Everyone in the
barxatty [35]

Answer: ask someone to show or explain the doll to him

Explanation:

edmentum

3 0
3 years ago
Other questions:
  • If you use a surrogate key, you must ensure that the candidate key of the entity in question performs properly through the use o
    5·1 answer
  • Information is a valuable asset and not everyone in the world can be trusted with it. Therefore, we need to protect our valuable
    10·1 answer
  • A ____ network (or workgroup) consists of multiple windows computers that share information, but no computer on the network serv
    15·1 answer
  • Are self driving cars essential for the future of transportation
    10·1 answer
  • What does a proxy server do?<br> Help please!!
    12·1 answer
  • A company asked you help mitigate the brute force attacks carried out against its users' Windows account passwords. You successf
    15·1 answer
  • What is a good rule of thumb for how much white space you should have in a flyer or poster
    7·2 answers
  • NEED HELP 100 POINTS FOR ANSWER AND BRAINIEST!!! Which comparison operator is used to signify that a value is not equal to anoth
    14·2 answers
  • Use the drop-down menus to complete each statement. Two main versions of Outlook are the desktop app and the app. The has limite
    15·2 answers
  • I want to start a debate about something
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!