1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fenix001 [56]
3 years ago
15

Fill in the blank

Computers and Technology
2 answers:
oksian1 [2.3K]3 years ago
8 0

Answer:

save as

Explanation:

if you're gonna save it over writing a different one save as is the answer

melamori03 [73]3 years ago
3 0

Explanation:

save as because if u want to save the bame of it press save as to save it as what u want

You might be interested in
2.Consider the following algorithm and A is a 2-D array of size ???? × ????: int any_equal(int n, int A[][]) { int i, j, k, m; f
Elis [28]

Answer:

(a) What is the best case time complexity of the algorithm (assuming n > 1)?

Answer: O(1)

(b) What is the worst case time complexity of the algorithm?

Answer: O(n^4)

Explanation:

(a) In the best case, the if condition will be true, the program will only run once and return so complexity of the algorithm is O(1) .

(b) In the worst case, the program will run n^4 times so complexity of the algorithm is O(n^4).

5 0
4 years ago
Plz help
Rama09 [41]

Answer:

name

Explanation:

name =

is an assignment to the variable called 'name'.

5 0
3 years ago
Read 2 more answers
May someone do this please? Thanks!!
vovangra [49]

Answer:Jeez

Explanation: thats a lot

5 0
3 years ago
Why did the spelling and grammar checkers in Word miss the errors highlighted in yellow?
Artemon [7]

Answer:

I do believe that it is a grammar mistake.

6 0
2 years ago
Read 2 more answers
Which is an ipsec protocol that authenticates that packets received were sent from the source?
fiasKO [112]

Answer:Encapsulating Security Payload (ESP)

Explanation:Encapsulating Security Payload (ESP) is a member of the IPsec protocol suite. It provides origin authenticity through source authentication, data integrity through hash functions and confidentiality through encryption protection for IP packets.

6 0
3 years ago
Other questions:
  • Which keyboard feature is a form feed character?
    14·1 answer
  • Which of the following represent typical account fees?
    7·1 answer
  • Google Slides saves your work to Google Drive. PowerPoint has the option to save to OneDrive. Both of these solutions are in the
    9·1 answer
  • Hen using presentation software, what do you do when you "compose a slide"?
    5·1 answer
  • Car batteries have two terminals which are (blank).
    8·2 answers
  • Write the proghrams for the following:
    13·1 answer
  • A small but growing advertising business hires a new secretary. Until now, the computers have been directly connected, and all t
    12·1 answer
  • (I need help also can u guys just give me some example just in case I got confuse)
    13·1 answer
  • Find what the secret message is. Get Brainliest if you are fast and correct.
    13·2 answers
  • Who plays xbox one offline and knows some multiplayer games that can be played offline.
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!