1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
agasfer [191]
3 years ago
14

Rafael needs to add a title row to a table that he has inserted in Word. What should he do? Use the alignment options. Use the M

erge and Center option for all the cells in the top row. Use the Merge and Center option on the first two cells in the top row. none of the above
I'll mark brainliest
Computers and Technology
2 answers:
raketka [301]3 years ago
6 0

Answer:

Answer is C

Explanation:

cluponka [151]3 years ago
5 0

Answer:

c

Explanation:

You might be interested in
Which are among the ways you can use bitlocker encryption? (choose all that apply?
igor_vitrenko [27]
There is a lot of ways that you can use the bit locker encryption. Some are when you are authenticating your computer using a TPM. Or when you are authenticating your account using a USB Flash drive, and most on the phones authentication through text messages and all.
3 0
3 years ago
Exampels of semantic tags ?​
spayn [35]
A semantic element clearly describes its meaning to both the browser and the developer.Examples of non-semantic elements: and <span> - Tells nothing about its content. Examples of semantic elements: ,, and - Clearly defines its content.</span>
4 0
3 years ago
Which role involves designing and creating advertisements for marketing purposes?
SOVA2 [1]

Answer: I cant give you an exact answer, but your options are gonna be B or C.

Explanation: A computer programmer actually doesn't work with a marketing company at all, most of them work from home as it is. And a Tech Support Specialist may work with a marketing firm, but it would be strictly IT stuffs.

3 0
3 years ago
Read 2 more answers
What is the name of the first practical asymmetric cryptosystem that was created?
victus00 [196]

Answer:

I think the name is RSA

4 0
3 years ago
The java class library interface queue method tagg retrieves the entey at the front of a queue but themrows a NosuchElementExcep
SCORPION-xisa [38]

Answer:D) peek

Explanation:Peek operation or function is the method that is used for the returning of the values on the front of the queue or stack type datatypes.               This operation function over those datatypes having group or collection of the elements and does not eliminate any element from the queue.

NOsuchElemnet exception is shown when there is the peek operation in the queue for the element to be displayed on the top and no deletion can take place .Thus, the correct option is option(D).

5 0
3 years ago
Other questions:
  • How to you put a color into a cell? <br> a.Shading<br><br> b.Fill<br><br> c.Color<br><br> d.Insert
    8·1 answer
  • You have been asked to delete some data from medisoft but find that there is no delete button. what is another method you can us
    10·1 answer
  • Which of the following is not a general strategy for organizing and analyzing qualitative data?a.Convert the data into one or mo
    6·1 answer
  • he specific gravity of gold is 19.3. Write a MATLAB program that will ask the user to input the mass of a cube of solid gold in
    15·1 answer
  • The code segment below uses the procedure IsPartOf (list, item), which returns true if item appears in list and returns false ot
    13·1 answer
  • . Let F(X, Y, Z)=(X + Y + Z)(X + Y + Z)(X + Y + Z)(X + Y + Z). Use a 3-variable K-Map to find the minimized SOP form of this fun
    15·1 answer
  • Given an array of integers and the size of the array, write a function findDuplicate which prints the duplicate element from the
    11·1 answer
  • QUICK HELP ME PLEASE
    9·1 answer
  • A Chain of dry-cleaning outlets wants to improve its operations by using data from devices at individual locations to make real-
    14·1 answer
  • if we try to use tail-recursive rules to implement non-tail-recursive rules, it will normally result in rules that are
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!