1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stealth61 [152]
3 years ago
11

If the user loads this graphic in a text only browser how will the browser describe it?

Computers and Technology
2 answers:
charle [14.2K]3 years ago
8 0

Im going to say probably not, it wont be able to describe it but it'll search it up and show what others match the image

steposvetlana [31]3 years ago
3 0

The answer is Absolute.

My quiz hasn't been graded yet but i'm sure it's correct. If not, sorry.

You might be interested in
Does the sticker list an automatic or manual transmission?
pantera1 [17]
Automatic, three speed transmission
5 0
3 years ago
Read 2 more answers
What shortcut bring up the print page
Kobotan [32]
The keyboard shortcut to bring up print on windows is ctrl+P, for Mac it's cmd+P.

Unless, you mean print screen - for that, there is a button that should say prt sc on your keyboard for windows, and for Mac, it's cmd <span>+ ctrl + shift + 3 to save to clipboard (or don't hold down the ctrl to save to your desktop).</span>
7 0
3 years ago
Read 2 more answers
The following sentence has a mistake.
Alja [10]

Answer:

You would put the cursor after the letter v in vermont and press back space and type a capital V to make it Vermont.

6 0
3 years ago
I know this is not a school type question but i really need some help.
pashok25 [27]
If I'm not mistaken u can't do that but u can go in your settings if u have an iPhone and add that email with your main one.
8 0
3 years ago
What log file contains information and error messages regarding network access generated by daemons such as ssd and xinetd?
ehidna [41]

Answer:

The correct answer to the following question will be "Secure".

Explanation:

This file includes information about the rights of verification and authorization.

  • It will be used primarily for monitoring the use of authorization schemes.
  • It holds all communications related to safety like faults in encryption.
  • This also monitors sshd logins, logins of SSH, as well as other system security resources daemon-logged failures.

So, it's the right answer.

3 0
2 years ago
Other questions:
  • Identify at least three body language messages that project a positive attitude?
    15·1 answer
  • WHAT IS A COMPUTER ????
    14·2 answers
  • Now tell me how be rich like Bill Gates
    6·1 answer
  • The overall visual look of a chart in terms of its graphic effects, colors, and backgrounds is the:
    5·1 answer
  • 2. a computer system designed to run games is called what?
    11·1 answer
  • How to create a network of relevant prospects?
    5·1 answer
  • I am doing keyboarding keyboarding is very boring and yeah
    12·2 answers
  • What is a best practice when approaching an automation effort?
    6·1 answer
  • When did time begin?
    11·1 answer
  • Which subscription service complements App-ID by enabling you to configure the next-generation firewall to identify and control
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!