1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cricket20 [7]
3 years ago
10

Elisa and Josh need to access General Help. Elisa will press the F1 key. Josh will click on ? in the upper-right corner of the W

ord document. Who will access General Help?
Computers and Technology
2 answers:
Charra [1.4K]3 years ago
6 0

only Elisa will access general help


kifflom [539]3 years ago
3 0
I believe that you either press the help icon or the F1 key, so Elisa will be the one to access General Help.
You might be interested in
Survey data are collected by using all of these methods EXCEPT
castortr0y [4]

Answer:

Survey data are collected by using all of these methods except Field Research.

Explanation:

In field research data has been gathered from different experiments, qualitative analysis and observations of any event.

On the other hand, survey data can be collected from Following:

<u>structured interview</u><u>:</u>

where data can be gathered by interviews and analyzed it on quantitative basis.

<u>Face to face questionnaires:</u>

Data has been collected by asking questions directly from users in the form of interview.

<u>self-administered questionnaires</u>

In this research, questionnaire has been designed to asked question related to some topic without conducting interview.

8 0
4 years ago
what new technology led to the chaos that spurred the establishment of the federal communications commission?
adelina 88 [10]

Answer:

The digital read Harry quaant

3 0
1 year ago
A software-based _________ is dedicated to examining and blocking internet traffic.
igomit [66]

A software-based <u>Firewall</u> is dedicated to examining and blocking internet traffic.

7 0
3 years ago
Read 2 more answers
Which is the best response to receiving a threating text from a classmate
Yuri [45]

Answer:

send a threatening text in reply, then block the phone number block the phone number, then contact his phone service provider immediately delete the text, then report the incident to authorities ignore the message, then get a new cell phone number.

Explanation:

5 0
3 years ago
Read 2 more answers
Which implementation uses both the legacy system and new system until all users verify that the new system functions correctly?
olasank [31]

Answer:

Explanation:

One group of students did an experiment to study the movement of ocean water. The steps of the experiment are listed below.

Fill a rectangular baking glass dish with water.

Place a plastic bag with ice in the water near the left edge of the dish.

Place a lighted lamp near the left edge of the dish so that its light falls directly on the plastic bag.

Put a few drops of ink in the water.

The student did not observe any circulation of ink in the water as expected because the experiment had a flaw. Which of these statements best describes the flaw in the experiment? (2 points)

Not enough ink was added.

Not enough water was taken.

The dish was too small for the experiment.

The lamp and the ice bag were at the same place.

3 0
3 years ago
Other questions:
  • Which of the following is an occupation management group? Select the choice that best answers the question.
    15·1 answer
  • Binary is a sequence of 0s and 1s such as 1001101 which can be used to code information. To break a code, you need to find how m
    14·1 answer
  • How do you change between worksheets inside an excel workbook?
    13·2 answers
  • David has created a lot of styles and now his Quick Style Gallery contains styles he no longer uses.
    14·2 answers
  • What does Data storage enable a browser to do
    5·1 answer
  • Assume that the string oldSeq has been properly declared and initialized and contains the string segment. Write a code segment t
    6·1 answer
  • Unemployment can be viewed as
    14·1 answer
  • You are a domain administrator for a large domain. Recently, you have been asked to make changes to some of the permissions rela
    11·1 answer
  • SUMMING THE TRIPLES OF THE EVEN INTEGERS FROM 2 THROUGH 10) Starting with a list containing 1 through 10, use filter, map and su
    7·1 answer
  • How Powerpoint is useful in education aspect?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!