1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andre45 [30]
3 years ago
11

WILL GIVE MORE POINTS, PLEASE HELP!!!

Computers and Technology
1 answer:
Karo-lina-s [1.5K]3 years ago
5 0
Right 4 down 5 right 8 !!!!!!!!!
You might be interested in
In Word, tables can be styled much like text can.<br> True<br> False
Delvig [45]

Answer:

True

Explanation:

There are many formatting options from color, size, and many more.

Hope this helps!

3 0
3 years ago
Assume that name and age have been declared suitably for storing names (like "abdullah", "alexandra" and "zoe") and ages respect
schepotkina [342]

Answer:

Explanation:

It is assumed that name and age have been declared suitably for storing names and ages. so the following is the code to read in a name  and age and printout the message "the age of name is age. "

cin >> Name;

cin >> Age;

cout << "The age of " << Name << " is " << Age << ".";

7 0
3 years ago
You have been asked to create a query that will join the Production.Products table with the Production.Categories table. From th
Flauer [41]

Answer:

The Fastest car in the world would be between 1,184 Horse Power-1,106 Torque

Explanation:

6 0
3 years ago
What kinds of online behaviors could be considered cyberbullying?
morpeh [17]

Answer:

anxiety, fear, depression, and low self-esteem. or flaming it refers to an online fight exchanged via emails, instant messaging or chat rooms. It is a type of public bullying that often directs harsh languages, or images to a specific person.

Explanation:

5 0
3 years ago
Read 2 more answers
Which of the following is NOT true about a flow chart?
SCORPION-xisa [38]
I think the answer is A
4 0
3 years ago
Other questions:
  • Of the different IRT roles, the _______________ is head of the team and issues the ultimate call regarding how to respond to an
    15·1 answer
  • Approximately what percent of U.S. businesses have some form of remote work program? (from Chapter 1)
    14·1 answer
  • Discussion group may have a___________ who monitors the postings and enforces the sides rules​
    13·1 answer
  • When activating windows, which type of volume activation is used to activate multiple windows systems, but must be individually
    12·1 answer
  • describe a situation in which peer pressure could cause a serious problem for safe driving, and how you could resist the peer pr
    8·2 answers
  • In 2009 to 2010, 1 in 10 social network users:
    10·1 answer
  • Why is information broken down into packets
    15·1 answer
  • What is a file path?
    7·1 answer
  • Keeping memos on your checks is important because they
    12·1 answer
  • a company recently implemented a secure sockets layer/transport layer security (ssl/tls) version that supports secure hashing al
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!