1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
g100num [7]
2 years ago
14

To share a document in my online electronic journal, I should select the option to _____.

Computers and Technology
1 answer:
Jobisdone [24]2 years ago
3 0
Select the option to send
You might be interested in
Why do so many people think the revision stage is the hardest
tia_tia [17]

It is because many people want to be perfect just at the start, but there is always room to improvement, but people don't accept that, so they don't want to be better than what they are already, so the don't revise themselves or anything.


6 0
3 years ago
Read 2 more answers
What is an example of an Internet access problem?
galina1969 [7]

B.

it's literally common sense

4 0
3 years ago
Read 2 more answers
What does it mean by does the author create an emotional connection toward the readers?
andreyandreev [35.5K]

Answer:

the author makes an emotional connection between you and the character

Explanation:

short version:you feel the characters emotion

6 0
2 years ago
Which of these YA (young adult movies is not base on a book is it A wrinkle in time, or Midnight sun,or Love,simon.
ExtremeBDS [4]
I think it’s midnight sun
4 0
3 years ago
What sorts of routine, seemingly unimportant information would help you learn about or break into another company’s network?
tatuchka [14]

Answer and Explanation:

  • Reboot your Computer from which you need to break into.
  • With your remote Ethernet card embedded and the unprotected passageway will mate up in a flash. You likewise need to change the Service Set Identifier (SSID) on your Ethernet card to coordinate SSID on the system's passage. You can decide to physically constrain your DHCP settings to reestablish, however on the off chance that that gives you any trouble.we need to re-boot it.
  • The Third Man ran a sniffer program that caught the majority of the LAN traffic within this organization. It was transmitted through the remote passageway straight into the Third Man's PC. Passwords. Agreements. Email.
4 0
3 years ago
Other questions:
  • An array subscript can be an expression, but only as long as the expression evaluates to what type?
    7·1 answer
  • When you hack a website, do you enter in the master code in the html section code data, or the offline/online system?
    14·1 answer
  • Normal or random variations that are considered part of operating the system at its current capability are ______: ​ a. systemic
    7·1 answer
  • What is the printout (display) of the following program? public class Test { public static void main(String[] args) { int[][] va
    9·1 answer
  • 25 POINTS! PLEASE ANSWER! Karrie would like to draw attention to some short statements in her document. What is the best way to
    6·2 answers
  • Who plays Roblox and wants to be friends on it
    9·2 answers
  • If I was to sort the months of the year in ASCENDING order alphabetically, which
    11·1 answer
  • The ratio of boys and girls is 4:5 calculate the number of boys if the are 1080 learners in schools​
    11·1 answer
  • GRAND THEFT AUTO 5 LOLLL
    15·2 answers
  • Dunbar's number, 150, refers to the number of:
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!