1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikdorinn [45]
2 years ago
14

The picture has the question on it

Computers and Technology
1 answer:
Bingel [31]2 years ago
4 0

The answer is B. Row

You might be interested in
What are the factors that influence the selection of access control software and/ or hardware? Discuss all aspects of access con
skelet666 [1.2K]

Answer:

While selecting the access control system (software or hardware), there are many factors that influence it and those factors are campus location, network capabilities, number of users using it, size of campus, the motive for using it, etc.

Explanation:

The access control system is electronic device that needs to be connected to the network for providing security control and authorization to the user to enter into the Campus.  

Access control systems are used to control access into premises or any IT area which is control in two ways either in a physical way or a logical way.

8 0
3 years ago
Ok so um does anyone know how i can use a divided by sign on computer?
Maslowich
You can just put “/“ to represent dividing
6 0
3 years ago
Read 2 more answers
Select the answer that best descibes what an opportunity cost is
TiliK225 [7]

Answer:

C.What you gain as a result of choosing one option versus another;a benefit.

Explanation:

6 0
2 years ago
Why is it helpful that the ribbon tabs can collapse?
Verizon [17]
<span>The 'Pin the ribbon' button replaces the 'Collapse the Ribbon' button when the ribbon is collapsed. You will see the 'Pin the ribbon' button only when you expand a ribbon by tapping or clicking a tab.</span>
4 0
2 years ago
Additional rows and columns are inserted into a table by using the _____ tab
Sindrei [870]
Insert tab
up at the top
have a nice day
6 0
3 years ago
Read 2 more answers
Other questions:
  • Why are resources limited? Why can't we get everything all the time?
    12·1 answer
  • WILL MARK BRAINLIEST HELP
    8·2 answers
  • What is a social media networks
    5·1 answer
  • PLEASE HELP!!!!! David has gone to the Niagara Falls with his camera. He wants to click photos of the people around him and also
    11·2 answers
  • Match the parts of the website address with its correct explanation. http://www.usa.gov/Agencies/federal.shtml
    10·2 answers
  • _____________ refers to know-what and know-why of technology.
    12·1 answer
  • Which of the following people was a member of FFA?
    7·1 answer
  • ____ steganography places data from the secret file into the host file without displaying the secret data when you view the host
    9·1 answer
  • lance has three tables in his database. He wants to generate a report to show data from the three tables. Therefore, he decides
    7·2 answers
  • When one loop appears inside another, the loop that contains the other loop is called the ____ loop. Group of answer choices ind
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!