1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
telo118 [61]
3 years ago
11

Whitespace consists of all of the following, except

Computers and Technology
2 answers:
nydimaria [60]3 years ago
4 0
It is C: COMMAS!!!
i hope i helped you!
GrogVix [38]3 years ago
3 0
C) Comma is the only character from given list which you can see.
You might be interested in
On tool hackers use to get sensitive information from victims is/are:
Feliz [49]
Pretty sure it’s keyloggers because it’s the only one that makes sense to me but I’m not 100% sure on that one
5 0
3 years ago
Read 2 more answers
Have a great day!
valina [46]

Answer:

thank you so much!

Explanation:

you seem like such a nice person! have a great weekend!

5 0
3 years ago
Read 2 more answers
Households play a role in the circular flow of goods by
BaLLatris [955]

Answer:

People in households buy goods and services from businesses in an attempt to satisfy their unlimited needs and wants.

Explanation:

Households also sell their labor, land, and capital in exchange for income that they use to buy goods and services that firms produce.

6 0
3 years ago
Which option can you use to control how text flows around a graphic?
Art [367]

Answer:

I believe your answer is C: Wrap Text

Explanation:

If you are trying to put an image in a more specific placement you would use Wrap Text. It helps making the image more clear and understandable because without wrapping the text it wouldnt make any sense and it would just be plain.

Hope this helps

3 0
3 years ago
Read 2 more answers
With magnetic readers being rendered inefficient for security, what are in most debit and credit cards now to enhance security?
Lena [83]
It’s RFID because they didn’t have enough money
7 0
3 years ago
Other questions:
  • Which of the following is not an algorithm?
    8·1 answer
  • Which individual of the following would be most likely to be directly concerned with web security?
    14·2 answers
  • During an experiment, if you purpose change the temperature to test a hypothesis the temperature is called what??
    6·1 answer
  • Systematically tackling the threats and vulnerabilities in the seven individual domains of a typical IT infrastructure helps you
    6·1 answer
  • What can you do to stop a computer from repeatedly restarting in a continuous loop?
    13·1 answer
  • Which of the following correctly describes the function of an IP address
    13·1 answer
  • What is f(-3) for the function f(a)=-2a2-5a+4?​
    10·1 answer
  • What lets you do many things, like write book reports and stories?
    15·1 answer
  • Find the output<br>I need it immediately​
    15·1 answer
  • Write a 20 charecter poem! for points! :)
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!