1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DiKsa [7]
3 years ago
15

If you need to download something for a class, first

Computers and Technology
2 answers:
7nadin3 [17]3 years ago
3 0

Answer:

left click, then click save image

Explanation:

professor190 [17]3 years ago
3 0

Answer:

first try to do it on kami, then on Google docs, then on doc-hub

You might be interested in
Arrange these steps of creating a presentation in the correct order. (notice that the given order is incorrect other than the ba
DedPeter [7]

Answer:

1) select the template option from the presentation wizard

2) select the background of your slideshow

3) assign animation to your slide​

4) click create presentation

Explanation:

not gonna lie, this was very confusing

hope it helps

3 0
3 years ago
Irene establishes a wireless connection between her laptop and smartphone for sharing files. She has created a LANWANPAN, which
stira [4]

Irene created a LAN , which generally uses Ethernet cables for communication.

<h3>What is LAN about?</h3>

The LAN ports are known to be employed to link computers that do not have Wi-Fi access and it is one that make use of an Ethernet cable.

Note that Irene created a LAN , which generally uses Ethernet cables for communication to access the internet.

Learn more about  wireless connection from

brainly.com/question/26956118

#SPJ1

3 0
2 years ago
Which of the following is a form of security protection that protects individual files by scrambling the contents in such a way
Alla [95]

Answer: C. File encryption

Explanation: To ensure security and privacy of files and its content, encrypting the file may be an option. File encryption refers to a process of ensuring the security and privacy of individual files so as to prevent unauthorized access to the content. File encryption works by setting up a security key which will be requested or needed when the file is being clicked such that only users or individuals with the authorized pass code or password can open and read its content or modify the file, this is called file decryption.

8 0
3 years ago
Peter works on a huge database of numerical figures in a worksheet ranging from cell A1 to cell I50. He has to print the workshe
Amiraneli [1.4K]
Landscape and portrait page orientation.
4 0
3 years ago
Read 2 more answers
What is an easy and accurate way that a graphic designer can increase the size of a digital shape while keeping the ratio of hei
VikaD [51]

Answer:

Open the shape’s properties window, and type the height value multiplied by 2 and the width value multiplied by 3.

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • What is the internet?
    5·2 answers
  • A person who wants to buy a compact disc (cd) has just enough money to buy one, and chooses cd a instead of cd
    10·2 answers
  • The degree to which a firewall can impose user access restrictions is known as which of the following?Security assurancePrivileg
    8·1 answer
  • Which of these programmers creates the core game engine?
    5·2 answers
  • Which key should you press and hold to select multiple cells?
    8·2 answers
  • Intelligence is to creativity as _____ is to _____. Group of answer choices spatial intelligence; musical intelligence correct t
    15·1 answer
  • A user input is when the user interacts with the program by typing.<br> True<br> False
    11·2 answers
  • In what ways can you modify the location of the neutral point?
    11·1 answer
  • The goal of this problem is to cover all roads with cameras. A camera placed at a station can cover all the roads connected to i
    9·1 answer
  • This feature automatically creates tables of contents.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!