1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
polet [3.4K]
3 years ago
14

You accidentally moved your task bar from the bottom of the screen to the left side. You would like to

Computers and Technology
2 answers:
Ratling [72]3 years ago
6 0

Answer:

by pressing yes

Explanation:

ik i am a tech god

Irina-Kira [14]3 years ago
3 0

Answer:

lock the taskbar

Explanation:

This is fairly self-explanatory. If I did happen to move my taskbar to the left side of the screen on accident, I would move it back to where it was, right click on the taskbar in an empty space and lock the taskbar so it can't be moved by dragging it around the screen.

You might be interested in
If the motherboard is not getting power, it will not start the boot. ... A four-year old laptop will not boot and presents error
lakkis [162]

Answer:

<em>The right order of steps you should take to repare the laptop is: D A C B</em>

<em>Explanation:</em>

<em>D. Ask yourself if the laptop is still under warranty: Because they will replace the board for you or give you a new machine.</em>

<em>A. Ask yourself if replacing the motherboard will cost more than purchasing a new laptop: since technology evolve every day, you might consider buying a new faster, better, advanced machine.</em>

<em>C. Find the service manual to show you how to replace the motherboard: the support assistence will guide you trhough the right way of replacing the board.</em>

<em>B. Find a replacement motherboard: choose the specific one or maybe try to find a better model, that can improve your computer performance.</em>

7 0
3 years ago
The development of instant cameras is generally credited to Oskar Barnack, an
Natalija [7]

Answer: that is false

Explanation:

7 0
2 years ago
Read 2 more answers
Which keyboard shortcut opens the find and replace dialog box to the replace tab?
Vsevolod [243]

Answer:

CTRL + F

Explanation:

usually CTRL + F but it would depend on the program  

3 0
2 years ago
Berikan contoh perameter sebuah meja.​
lara31 [8.8K]

Answer:

The simplest of table parameters are rows, columns, page number, alternate row, column header, Table title, etc.

Explanation:

The simplest table parameter is as being mentioned above. Its, however, important to understand what are the parameters. Parameters are the features of an object that defines its behavior. Various parameters are the behaviors of the object hence, and here it is the table and the behavior of the table is being described with the parameters. There are so many other parameters that one can think of related to tables. And we should make a list of them for future studies. Font size, Font color, border, etc are some more from the huge list.

5 0
3 years ago
Which securities protect data through processes, procedures,decisions,and user pernissions. Determines where and how data can be
vovangra [49]

Answer:

Data can be stored on storage devices.

Explanation:

Network security, Application security and information security are the securities that protect data. Data can be stored on storage devices such as hard disk drives, solid state drives, external hard drives, USB flash drives and SD cards etc. Hard disk drives, floppy disks and tapes store data magnetically. The data can be stored with a device that spins the disk with magnetic coatings and heads has the ability to read and write information in the form of magnetic patterns.

5 0
3 years ago
Other questions:
  • How can I use the internet/social media to protect my identity?
    14·1 answer
  • When an Ethernet NIC has been configured by the OS to use half-duplex, the transmit pair of the twisted-pair cable usestransmiss
    14·1 answer
  • Explain the concept of an engineering trade-offs and give an example
    6·2 answers
  • For her homework, Annie has added the picture of a fruit in a document. She wants to enhance it to give a cut-out look. Which fe
    5·2 answers
  • Sample outputs with inputs 9 5 2 -1 in python.
    8·1 answer
  • What are five types of applications you can create in Visual Basic 2017?
    12·2 answers
  • Pls answer i will give 20 points
    7·1 answer
  • ________ is the art of manipulating people into breaking normal security procedures or divulging confidential information.
    12·1 answer
  • When conducting memory and recall tests, some people make an effort to normalize memories by not reporting extreme cases. this l
    12·1 answer
  • Please solve this in JAVA<br><br> Please see the attachment
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!