1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nirvana33 [79]
4 years ago
14

If you have a list of words that you wish to make into a bulleted list, you must first highlight or ________ the words with your

cursor. delete remove select copy
Computers and Technology
1 answer:
motikmotik4 years ago
3 0
<h3>Answer:</h3>

C. select

<h3>Explanation:</h3>

A. if you delete the words you can make them into a bulleted list

B. if you remove them you can make them into a bulleted list neither

D. Copying the words doesn't need for that

Hope it helped you

You might be interested in
To ensure rapid recovery and security of data, backup data should be ________.
Nataly [62]

Answer:B kept at a secure location at the facility

Explanation:

8 0
3 years ago
Not everything is a success all of the time! So do you know which version of Windows was the least popular?
mario62 [17]

Answer:

windows xp

Explanation:

I think because it is not fast and don't play the games and programs which have higher requirements

7 0
3 years ago
Size of a request header field exceeds server limit.
garri49 [273]
Try to Increase the value for the directive LimitRequestFieldSize in the httpd.conf:


Reason: This is normally caused by having a very large Cookie, so a request header field exceeded the limit set for Web Server.
For IBM® HTTP Server, this limit is set by LimitRequestFieldSize directive (default 8K). The LimitRequestFieldSize directive allows the Web server administrator to reduce or increase the limit on the allowed size of an HTTP request header field.
SPNEGO authentication headers can be up to 12392 bytes. This directive gives the server administrator greater control over abnormal client request behavior, which may be useful for avoiding some forms of denial-of-service attacks.

8 0
3 years ago
Similar to Wi-Fi, ____ is designed to provide Internet access to fixed locations (sometimes called hotzones), but the coverage i
andrew11 [14]

Similar to Wi-Fi, WiMAX is designed to provide Internet access to fixed locations (sometimes called hotzones), but the coverage is significantly larger.

<h3>What is WiMAX used for?</h3>

WiMax is know to be a full worldwide interoperability that is said to be made just for microwave access and this is said to be a form of a communication technology that was set up for wireless delivering of  high-speed Internet service to a lot of geographical areas.

Wi-Fi is also known to be a kind of a wireless technology that is often used to link up computers, tablets, and other devices to that of the internet.

Note that Wi-Fi is said to be a radio signal transmitted from a wireless router  and as such, Similar to Wi-Fi, WiMAX is designed to provide Internet access to fixed locations (sometimes called hotzones), but the coverage is significantly larger.

Learn more about Wi-Fi from

brainly.com/question/13267315

#SPJ1

8 0
2 years ago
Assume that the classes listed in the Java Quick Reference have been imported where appropriate.
Georgia [21]

rcre2nvijrnv

u1bcihdebc

nn

8 0
4 years ago
Other questions:
  • Which of the case studies that you read (Walmart, Target or 5 Big Data Industries) caught your attention and why? Before reading
    11·1 answer
  • How many values will the user submit each time this form is used? Color: RedBlueGreen Quantity:
    10·1 answer
  • You support Richman Investments, a brokerage firm that employs 20 brokers. Each broker has his own client computer, and the firm
    15·1 answer
  • 2. How do web bugs invade a person’s privacy?
    10·2 answers
  • A one page document that introduces you, your skills and background and asks for an interview is an example of what type of docu
    5·2 answers
  • 6. Larger Than n In a program, write a function that accepts two arguments: a list, and a number n. Assume that the list contain
    9·1 answer
  • EVERYONE PLS JOIN MY GOOGLE CLASSROOM<br> CODE: clmvjbd
    13·2 answers
  • During side show mode, hitting the B key will do which one of these?
    7·1 answer
  • Why is computer called information processing maching???​
    6·2 answers
  • How long will it take to transfer a file size of 1gb on a usb 2.0 and a usb 3.0 drive?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!