1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
frozen [14]
3 years ago
9

Ryan would like to copy a list of contacts from a colleague into his personal address book. The list of contacts is

Computers and Technology
1 answer:
Colt1911 [192]3 years ago
5 0

Answer:

He should: Format the text file with comma-separated values and save as CSV file type. ]

Explanation:

hope this helps!

You might be interested in
Substance abuse is an _____ coping mechanism.
hichkok12 [17]
Mental coping mechanism.
7 0
2 years ago
Which browser folder contains previously viewed web pages?
Arlecino [84]
<span>The history browser folder contains previously viewed web pages. This folder </span>stores the URLs of sites you have accessed within a defined period of time, which means you can see your browsing history.
<span> You can choose how you want to view the history by selecting a filter from the menu on the history tab.</span>
6 0
3 years ago
A port in what state below implies that an application or service assigned to that port is listening for any instructions?
astraxan [27]

Answer:

a. open port

Explanation:

Based on the information provided within the question it can be said that the port state that represents this is an open port. Like mentioned in the question below, this state refers to a TCP or UDP port that has been configured to receive packets, or in other words listen to oncoming instructions that are being sent from other computers or servers.

6 0
2 years ago
Is brainly down? Cant search anything
stealth61 [152]
You need to have WIFI
8 0
2 years ago
Access to a computer can be controlled using a ____ password.
slamgirl [31]
Yes it can be control by a USER ( administrator and having a MASTER password) 
8 0
3 years ago
Other questions:
  • Describe the concepts of Defense in Depth and Detection in Depth. Compare and contrast. What's different? What's similar?
    9·1 answer
  • You decide to begin your presentation by providing your audience an overview of networking, with an emphasis on security and why
    11·1 answer
  • After you enter the details for the first selected recipient in the New Address List dialog box, click _______ to add another re
    9·1 answer
  • Courts are struggling with the privacy implications of GPStracking. In 2009, New York’s highest court held that policeofficers m
    8·1 answer
  • A case competitions database:You work for a firm that has decided to sponsor case competitions between teams of college business
    12·1 answer
  • The physical parts of the computer are known as?
    14·1 answer
  • When do you use FTP?
    10·2 answers
  • A rocket always rotates about its___?
    9·2 answers
  • Which of the following can ensily reverse motion and are better at varying speeds than electrical motors?
    10·1 answer
  • 1: define about information system in computer?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!