1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bad White [126]
3 years ago
10

Complete the procedure for adding a contact by selecting the correct term from each drop-down menu.

Computers and Technology
1 answer:
VARVARA [1.3K]3 years ago
6 0

Answer:

1 new contact 2 save and close

You might be interested in
What is a device driver
Elan Coil [88]

A device driver is a computer program that operates or controls a particular type of device that is attached to a computer.

5 0
3 years ago
_______ refers to the poitically, religiously, or ideologically motivated use of computers (or related technology) by an individ
Anettt [7]

Answer:

The answer of the following blank is Cyberterrorism .

Explanation:

Cyberterrorism is the violent act by the use of an internet that results in the threat of any important files or the loss of life or the significance of the bodily harms, to achieve an ideological or political gains through the threat or the intimidation.

6 0
3 years ago
What would you enter at the command prompt to start a new bourne again shell session?
butalik [34]

The answer is bash . The bash command opens a Bourne-again sheel (bash) session. It is the standard shell used in most Linux computers and it uses commands similar to a UNIX shell. Bash includes features such as:

1) Command completion when pressing the tab key.

2) Command history.

3) Improved arithmetic functions.

6 0
3 years ago
WILL MARK BRAINLIEST FOR ANYONES ANSWER!
Anvisha [2.4K]

Answer:

just know that bit gonna be running when I make mine Imma have 720 fps btw today sponsored is nord VPN

4 0
3 years ago
30 points Fill in the blanks,<br> Plz leave a explanation
Butoxors [25]

not all the question are showing type it out

7 0
3 years ago
Read 2 more answers
Other questions:
  • When used as parameters, _________ variables allow a function to access the parameter’s
    10·1 answer
  • Why is it useful to have host-based firewalls?
    5·1 answer
  • What kind of voltage do solar cells generate? Solar cells produce ______ voltage which is not usable by most household appliance
    15·1 answer
  • Define reverse engineering in hacker context
    15·1 answer
  • Which Boolean operator enables you to exclude a search term?
    9·2 answers
  • What are indexes in a database?
    14·1 answer
  • What is the only language a microprocessor can process directly but most programmers almost never write programs in this code? Q
    12·2 answers
  • When a user inserts a PivotTable, where will it be inserted?
    15·1 answer
  • Please assist me with these questions - Do not send me links. Issues in opening the links:
    9·1 answer
  • A palindrome is a string whose reversal is identical to the string. how many bit string of length 20 are palindromes and do not
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!