1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotykmax [81]
3 years ago
12

Which of the following is not an advanced strategy you may use to help you conduct a search on the Internet?

Computers and Technology
1 answer:
frosja888 [35]3 years ago
6 0

using firefox isnt an advanced stragedy

You might be interested in
What would you do if you experienced academic frustrations in school? Check all that apply.
kipiarov [429]
I think it is all of them :))
6 0
3 years ago
Read 2 more answers
Which contact field is used to control the name that would appear in the To field of an email message when a user is sending a m
ser-zykov [4K]

Answer:

Display as

Explanation:

Need the same question, but that's my guess, because display, means to show.

3 0
3 years ago
Read 2 more answers
5 of 10
DaniilM [7]

Answer:

what

Explanation:

3 0
3 years ago
What symbol precedes all structured references in formula autocomplete lists?
Zolol [24]
Structured references make it easier to use formulas with Excel tables by ... Use brackets around specifiers All table, column, and special item ...
4 0
3 years ago
Discuss your role as an IT professional in terms of your responsibility to clients, co-workers and society.
Tom [10]

An IT professional is expected to deliver correct installations and programming that are safe from security breaches to clients. To co-workers, teamwork, respect, and brainstorming are needed to work together and achieve results. To society, an IT professional is expected to deliver architectures that do not compromise security and privacy.

An information technology professional could be focused on the hardware or software of systems. It is vital that IT professionals deliver services that are foolproof and not susceptible to attacks.

When working with colleagues, they must cooperate in order to deliver the most efficient services.

Learn more about IT professionals here:

brainly.com/question/14314381

8 0
2 years ago
Other questions:
  • Using the syntax in section 2.3, write a command delete_all_rights (p, q, s). this command causes p to delete all rights the sub
    13·1 answer
  • What are the core scripting and coding technolies used to build ai platforms?
    14·1 answer
  • A superscope is a special type of scope that allows a dhcp server to service multiple ipv4 subnets on multiple physical networks
    7·1 answer
  • The ________________ command tests connectivity by sending an echo request to a remote computer.
    14·1 answer
  • For this lab, you will work on a simple GUI application. The starting point for your work consists of four files (TextCollage, D
    5·1 answer
  • Would anyone know this
    10·2 answers
  • In an MLA style citation for an image, what information should be listed first? A. The name of the creator B. The title of the i
    8·2 answers
  • A line beginning with a # will be transmitted to the programmer’s social media feed.
    11·2 answers
  • If Anyone can help me out that'll be great
    11·1 answer
  • To generate a series of first ten counting number of algorithm​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!