1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sphinxa [80]
3 years ago
12

Which is the correct process for selecting nonconsecutive worksheets in a workbook?

Computers and Technology
1 answer:
avanturin [10]3 years ago
3 0
If you have mac A. if you have windows i dont know

You might be interested in
PLEASE HELP! I'm offering brainliest!
Marina CMI [18]

Answer:

1. Undo  2. Font Type   3. Font Size  4. Bold Font 5. <em>Italics  </em>6. Word Color  7.  Document Margins

Explanation:

Did you know that all of these answers are how to format a document?

7 0
3 years ago
Nancy would like to configure an automatic response for all emails received while she is out of the office tomorrow, during busi
marishachu [46]

Answer:

I believe the answer is the second one

5 0
4 years ago
Read 2 more answers
What Is an Antivirus?
wariber [46]
Antivirus software, or anti-virus software, also known as anti-malware, is a computer program used to prevent, detect, and remove malware. Antivirus software was originally developed to detect and remove computer viruses, hence the name.
8 0
3 years ago
Read 2 more answers
Leah’s computer is connected to the network most of the time. Once, she noticed few of her files with sensitive data were missin
vivado [14]

Answer:

The Firewall (Router) is the vulnerable hardware.

Explanation:

The entry into the network will be the firewall (If there is a firewall installed on the network), if this medium is compromised, every workstation on the network will be vulnerable.

3 0
4 years ago
What are the inputs that the model uses to make decisions?
hodyreva [135]

Answer:

It makes the decision better and adds ownership in the implementation

Explanation:

Hope this helps C:

~Chiena

8 0
2 years ago
Other questions:
  • Which type of attack modifies the fields that contain the different characteristics of the data that is being transmitted?
    7·1 answer
  • Which of the following is 1000 of a second​
    15·1 answer
  • I’m which scenario would someone most likely be using presentation software ?
    6·2 answers
  • 1. In your own words, describe the purpose of a for a loop.
    11·1 answer
  • If you have an equipment failure while driving on an expressway, you should
    8·1 answer
  • Help plz,l didn’t pay attention in class
    7·1 answer
  • An example of computer hardware is ? A. keyboard B. app C. web browser D. operating system
    13·2 answers
  • Determine what is printed by the following code.
    8·1 answer
  • Anyone on ps4 willing to trade me a fennec or McClaren on rocket league?
    6·2 answers
  • Bluetooth is the popular name for the 802. 15 wireless networking standard, which is useful for creating small __________.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!