1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
borishaifa [10]
3 years ago
7

You can view information for the individual people who will perform the tasks on theproject in the

Computers and Technology
1 answer:
marin [14]3 years ago
8 0

Answer:

Resource Sheet view

You might be interested in
All slides in a presentation must use the same transition. True or False?
krek1111 [17]
False. you can make different slides have different transitions
7 0
4 years ago
Read 2 more answers
Public-key cryptography (a form of asymmetric cryptography) is an encryption method that's widely used because: 1) it is computa
rosijanka [135]

Answer:

C.

Explanation:

7 0
3 years ago
What are some ways you can work with templates? Check all that apply.
yaroslaw [1]
What are some ways you can work with templates? Check all that apply.

Answer: (A,D,E) see picture below for help also.

7 0
3 years ago
Read 2 more answers
if anyone could help me with this it would be great. I have to turn in a practice resume and im completely lost and have no clue
Lyrx [107]
Research software developer resume. reword some things and then u got it
7 0
3 years ago
You are a network administrator at your company. A user attempts to start a computer and receives the following error message: "
katen-ka-za [31]

Answer:

bootrec/rebuildbcd

Explanation:

Several reason could have caused this, ranging from failed updates or installations to boot sector virsues etc

To fix this, you will need to restart the computer (Alt+Ctrl+Del) into recovery mode, Write the bootrec/rebuildbcd command and press enter or bootrec/fixboot.

If the task is successful, you will get a message "The operation completed successfully."

Then you are free restart your computer

5 0
3 years ago
Other questions:
  • David would like to send a letter to more than one hundred people. He would like the letter to have names and addresses inserted
    7·1 answer
  • ​In addition to joint application development, another popular user-oriented method is _____, which resembles a condensed versio
    14·1 answer
  • A company needs to store its documents in one place, share news and information with all staff, and allow access for employees w
    8·1 answer
  • Which of the following is the correct ordering of operating systems, oldest to newest?
    5·2 answers
  • Suppose you are given a text file. Design a Python3 program to encrypt/decrypt that text file as follows:
    14·1 answer
  • I plugged my headphones into my computer, but the sound still came out of the speakers. help!
    6·2 answers
  • Who created fortnite
    15·2 answers
  • A user’s laptop hard drive contains sensitive information. The user often plugs the laptop into the corporate network. A sensiti
    14·1 answer
  • Choose the correct term to complete the sentence.
    12·1 answer
  • A network administrator determines who may access network resources by assigning users
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!