1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iogann1982 [59]
3 years ago
12

To celebrate me reaching expert in the same day i made the account im doing a point giveaway

Computers and Technology
2 answers:
Shkiper50 [21]3 years ago
8 0

Answer:

TYYYY

Explanation:

eeee

stiv31 [10]3 years ago
3 0

Answer:

thank youuu sooo much

Explanation:

You might be interested in
Bro how the hell do u do full screen on windows
Rudik [331]

Answer:

You'll need to hold down/click<em> </em>f11 and fn at the same time.

If not that, try ctrl + shift + f5.

I can guarantee the first works; not too sure about the second.

Explanation:

Well, it's hotkeys, so...

<em>EDIT: The f5 command does nothing related to full screen, my bad.</em>

7 0
3 years ago
Read 2 more answers
Which tools can be used to scale an object? Check all that apply.
meriva

Answer:

format picture pane

corner sizing handles

Explanation:

7 0
3 years ago
What is the biggest decision you think you will make in your lifetime? Explain why you think it would be such a big decision.
KengaRu [80]
Having kid will be the biggest thing ever ever
7 0
3 years ago
Read 2 more answers
Storage system that uses lasers to read data
tatuchka [14]

I believe it is an optical storage system that uses lasers to read data.

5 0
4 years ago
Read 2 more answers
a ------------ insurance policy covers a business during the restoration period after a natural disaster
cricket20 [7]

Answer:

Business Interruption

Explanation:

just took on apex

5 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following OSI layers is responsible for the segmentation, multiplexing, flow control and host-to-host communication
    6·1 answer
  • Pleas help with this question: Which statement about word processing software is true?
    15·1 answer
  • What operating system type uses icons to represent programs
    9·2 answers
  • The network services and facilities that users interact with are provided by
    11·1 answer
  • What are the principal cybersecurity threats, both internal and external, and the principal safeguards that have been developed
    13·1 answer
  • Can anyone fill in the space please
    6·1 answer
  • A user creates a GPO. What do you need to do for that user to manage his or her GPO that he or she created?
    12·1 answer
  • How to get free PS5?
    8·2 answers
  • Follow the directions below to submit Assignment 2:
    11·1 answer
  • An example of a host-based intrusion detection tool is the tripwire program. This is a file integrity checking tool that scans f
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!