1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artyom0805 [142]
3 years ago
15

Type the correct answer in the box. Spell all words correctly.

Computers and Technology
1 answer:
Viktor [21]3 years ago
4 0

Answer:

editor

Explanation:

I just took the test and got it right.

You might be interested in
Need help this is for my technology class. We are doing a city research paper but it’s the rough draft and I’m doing la. But I c
serious [3.7K]
One business is " Backwards Beekeepers," Your welcome. >,<
5 0
3 years ago
Read 2 more answers
What is the name for the strip of frequently used icons on a computer? O App O Program O Toolbar O Utilities panel ILL MARK YOU
liubo4ka [24]

Answer: The name of the strip is the Toolbar.

7 0
3 years ago
Read 2 more answers
You
N76 [4]

Answer: A

Explanation: the process or action of verifying the identity of a user or process.

Hope this helps ^.^

8 0
3 years ago
Read 2 more answers
When you right-click a spreadsheet object, what command should you select to activate the sheet?
miss Akunina [59]
I would think the answer is C. Hope this helps! :D
5 0
3 years ago
Read 2 more answers
Which is better computer science or software engineering?
mina [271]

you have to be extremely talented to be a software engineer so I see that as way more complex and cool.

3 0
3 years ago
Read 2 more answers
Other questions:
  • Which view In a presentation program displays you’re slides in full screen modes ?
    8·2 answers
  • Suppose we provide a new implementation of the transport layer protocol tcp providing the same functionality using different alg
    14·1 answer
  • Adding _______ around calculations indicates which calculations should be performed first before following the typical order of
    6·2 answers
  • You may declare an unlimited number of variables in a statement as long as the variables are ____.
    14·1 answer
  • Two-factor authentication can best be breached by the adversary using:________. a. social engineering attack b. using sniffers l
    10·1 answer
  • You are a network engineer tasked with performing a site survey for a multiple-channel architecture (MCA) system in a three-stor
    11·1 answer
  • To communicate with coworkers in the office
    10·1 answer
  • What's the main idea??
    12·1 answer
  • Please help me with this coding problem :)
    6·1 answer
  • When one loop appears inside another, the loop that contains the other loop is called the ____ loop. Group of answer choices ind
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!