1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fenix001 [56]
3 years ago
15

Fill in the blank

Computers and Technology
2 answers:
oksian1 [2.3K]3 years ago
8 0

Answer:

save as

Explanation:

if you're gonna save it over writing a different one save as is the answer

melamori03 [73]3 years ago
3 0

Explanation:

save as because if u want to save the bame of it press save as to save it as what u want

You might be interested in
For whover needed pont
podryga [215]

Answer:

Thank you have a nice day:)

8 0
3 years ago
Read 2 more answers
How much cell phone data does the average person use a month
azamat
It all depends on what you're doing online.
7 0
3 years ago
Which protocol below is used to email clients to send email
AVprozaik [17]

The Internet Message Access Protocol (IMAP) is a mail protocol used for accessing email on a remote web server from a local client. IMAP and POP3 are the two most commonly used Internet mail protocols for retrieving emails

4 0
3 years ago
The dashed lines that display on your slide when you are moving an object are
diamong [38]
The answer is "smart guides".
6 0
3 years ago
How do you get a free ps4
KatRina [158]

Answer:

By having very good luck and winning it in a giveaway!!!

4 0
3 years ago
Read 2 more answers
Other questions:
  • Read the description of Mike’s work, and identify his profession. Mike’s job is to record sounds in a studio. He studies a video
    14·2 answers
  • Software engineering design teams use ________, which are grounded in mathematical concepts of sets and relations, for their sof
    13·1 answer
  • What are considered to be among the earliest adhesives?
    15·1 answer
  • If variable x has value 2 and y has value 2, what is the value of the following Jack expression?
    9·1 answer
  • Write a function that checks whether two words are anagrams. Two words are anagrams if they contain the same letters. For exampl
    13·1 answer
  • _____ can render data useless to unauthorized users who might have violated some of the database security layers.
    7·1 answer
  • Pictures that you can click on to tell your computer what to do.
    12·2 answers
  • Imagine a mythical set of protocols with the following details. Maximum Link-Layer data frame: 1,455 bytes Network-Layer header
    8·1 answer
  • T F Changes to a function parameter always affect the original argument as well.
    15·1 answer
  • Create a Divisible application that displays a random integer between 1 and 100 and displays appropriate messages stating whethe
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!