1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PtichkaEL [24]
3 years ago
12

Aubrey is on a Windows machine. She wants to back up her Halloween pictures on an external hard drive. Which of the following ta

sks is she likely to perform as part of a sequence of actions do that?
A. Right-click the file and choose the Copy option.
B. Open the application and select the File menu.
C. Right-click the file and select the Delete option.
D. Go to the location where you want to save the file.
E. Right-click an empty area and select the Paste option.
Computers and Technology
1 answer:
Leya [2.2K]3 years ago
8 0

Answer:

no clu3 lol

Explanation:

I'm stupid hahaha

You might be interested in
How to change your phone number t mobile?
dexar [7]
U van change it by buying an new Sim card or buy trading it in
8 0
3 years ago
Changes in computer technology have an effect on _____. computer scientists only people who work with computers only everybody p
luda_lava [24]
Changes in computer technology have an effect on <span>everybody.</span>
6 0
4 years ago
Read 2 more answers
What is a feature of readable code?
mamaluj [8]

Answer:

sorry for the wait but the answer is b

Explanation:

5 0
3 years ago
Read 2 more answers
Which subunit of a heterodimeric cdk is the regulatory subunit?
Lemur [1.5K]
The answer is cyclin subunit
8 0
3 years ago
Which of the following is true of a transition?
BaLLatris [955]
Answer choice c is correct
8 0
2 years ago
Other questions:
  • The company database may be stored on a central database server and managed by a database adminstrator true or false
    12·1 answer
  • Write a program that accepts a time as an hour and minute. Add 15 minutes to the time, and output the result. Example 1: Enter t
    11·1 answer
  • Which term describes the second core IPSec security protocol; it can perform authentication to provide integrity protection, alt
    13·1 answer
  • Which option will you use to expose your presentation to the audience
    11·2 answers
  • When connecting past and present issues, it is best to follow a series of steps. Which step is missing from the pattern? 1. Iden
    13·1 answer
  • What is the definition of trouble shooting.
    12·1 answer
  • Is a ROUTER required for Internet Connectivity ?<br> Yes<br> No
    11·1 answer
  • Which of the following statements describes the general idea of an assistive media​
    7·1 answer
  • When you save a new file, you use the ______ dialog box to provide a filename and select a location of the file.
    9·1 answer
  • On a cdma (code division multiple access) network, how are mobile handsets identified by the carrier?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!