1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
timofeeve [1]
3 years ago
14

Elisa and Josh need to access General Help. Elisa will press the F1 key. Josh will click on ? in the upper-right corner of the W

ord document. Who will access General Help?
Computers and Technology
2 answers:
mars1129 [50]3 years ago
4 0
The answer is only Elisa
astraxan [27]3 years ago
3 0
It will be elisa who will get to it
You might be interested in
What type of malicious procedure involves using sniffing tools to capture network communications to intercept confidential infor
Alex_Xolod [135]

Answer:

eavesdropping

Explanation:

Eavesdropping is as an <em>electronic attack</em> where digital communications are intercepted by an individual whom they are not intended. This is done in two main ways: <em>Directly listening</em> to digital or analog voice communication or the <em>interception or sniffing</em> of data relating to any form of communication.

4 0
3 years ago
I need help with this plz question 2 and 3 asap
Lena [83]

I an not sure what you want me to do so I am going to help you on both of these problems:

Question 2 answer: I think the answer is University/industry interaction

Question #3 answer: I think the answer for this is clearly written in the question (i think that the second answer choice is it)

I am not sure what this is but i am only in the 10th grade!!!! the only class that I took last year was Computer Fundumentals

Btw I am in K12 as well :)

4 0
3 years ago
Which process is used to protect transmitted data in a vpn?
wlad13 [49]
Here is the answer: <span>Tunneling</span>
3 0
3 years ago
3X5
yan [13]

Answer:

15

Explanation:

cause when you multiply three by five it will give u 15

7 0
2 years ago
Search the link <br><br> gKuJXd3zYDc<br><br> Subscribe I have a vid premiering soon
lawyer [7]
I will hope this helps :p
5 0
2 years ago
Other questions:
  • Marie uses a browser to visit a blog. What is the unique identifier of the blog?
    5·1 answer
  • Is a network traffic management device used to connect different network segments together?
    9·1 answer
  • What is the 16-bit hexadecimal representation of each of the following signed decimal integers?
    13·1 answer
  • How can a professional association help you reach your career goals?
    5·1 answer
  • What are the methods of identifying publicly switched networks?
    14·1 answer
  • Can change the tab colors of the worksheets in excel
    13·1 answer
  • A occurs when you reset a mobile device but retain your installed applications and personal settings
    10·2 answers
  • Information about www
    14·1 answer
  • What will be displayed after this code segment is run?
    5·1 answer
  • A eclipse occurs at a full moon when the moon passes between earth and the sun
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!