1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sedbober [7]
3 years ago
9

How do you create multiple columns in Word?

Computers and Technology
1 answer:
mrs_skeptik [129]3 years ago
7 0

Answer:

I think it's B

Explanation:

it sounded right to me.

You might be interested in
How do I insert a row in between 1 and 2 in excel?
Vlada [557]
This link should help: https://uhasct.com/insert-an-empty-row-between-each-row-of-data-in-excel/
5 0
3 years ago
Read 2 more answers
Think of an example in your life where a number could be described as data, information, and knowledge
zhannawk [14.2K]

Answer:

how many event you have been too in the last month (well non during this time but as an example)

Explanation:

4 0
3 years ago
Under which reflection(s) is the image of line m also a line?
lubasha [3.4K]

Answer:

c

Explanation:

5 0
3 years ago
Read 2 more answers
What is the function of Cascading Style Sheets?
Kaylis [27]

Answer:

answer is c

Explanation:

no need for explaination

8 0
3 years ago
The computer code behind password input can be modified to force people to change their password for security reasons. This is k
bazaltina [42]

Answer:

to remember the passwords you could either make a little rhyme to "help" remember it or you could be like everyone else and write it down on a piece of paper. you could also write the password over and over again to make it stick. a way to make a password different from an old one is to use completely different wording and completely different numbers.

Explanation:

3 0
3 years ago
Other questions:
  • To determine why a computer program started to function differently, Mel should most likely use data to
    5·2 answers
  • A trojan horse
    12·1 answer
  • Brute force attacks involve identifying a valid user account and then bombarding the server with an extensive:
    13·1 answer
  • Why is statistics important?
    6·1 answer
  • You want to securely erase data from your hard drive what can you use to do this and what is the process called
    12·2 answers
  • PLEASE ANSWER ASAP
    7·1 answer
  • GAMER OYUNCU KOLTUĞU % YERLİ
    6·1 answer
  • The total number of possible keys for des is _________, which a modern computer system can break in a reasonable amount of time.
    10·1 answer
  • Which programming element is used by a game program to track and display score information
    12·2 answers
  • There are ___ Federal Reserve Banks. Each bank is also in charge of its assigned District Banks.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!