1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Contact [7]
3 years ago
6

Complete the sentence.

Computers and Technology
1 answer:
KatRina [158]3 years ago
6 0

Answer:

tCP

Explanation:

You might be interested in
Which screen should be open to customize or personalize a desktop background?
stira [4]
Display Properties is the screen that should be open
5 0
3 years ago
Read 2 more answers
What process combines data from a list with the content of a document to provide personalized documentsWhat
Morgarella [4.7K]
Mail merge can combine data with the content of a document to make personalized documents.
6 0
3 years ago
Read 2 more answers
This is not school related in anyway but. I used to play this videogame on my computer years ago, but i cannot remember the name
Taya2010 [7]
Cat Quest possibly? How long ago? i remember playing many. I LOVE CATS.
4 0
3 years ago
Read 2 more answers
Which of the following is an example of a fixed expense clothing or rent or entertainment or food
V125BC [204]
Salutations!

<span>Which is an example of fixed expense?

Rent is an example of fixed expense, It doesn't matter whether you sell a widget or produce thousand of them, you must still pay the rent in any </span><span>circumstances.
</span>
Hope I helped.
5 0
4 years ago
Which math operator is used to show multiplication in a spreadsheet formula
Anna11 [10]

Astrix (*) is used to multiply

Example: 5*5 (the answer would come out as 25)

If you’re using Excel, do it in the formula bar of course.

8 0
3 years ago
Other questions:
  • Which of the following is a preferable method to secure wireless access in a SOHO?
    6·1 answer
  • The Internet began when a large company wanted to sell products online. True False
    15·2 answers
  • What are three reasons teens might start drinking alcohol??
    7·2 answers
  • Who Can Infiltrate And Use Email Notifications To Camouflage Malicious Links ?
    13·1 answer
  • A(n) _____ is someone who uncovers computer weaknesses and reveals them to manufacturers or system owners, without exploiting th
    15·1 answer
  • When you expand the virtual size of a game, what do you create?
    7·1 answer
  • Five advantages of Internet​
    6·2 answers
  • Which century saw the development of letterpress printing?
    10·1 answer
  • Can you distinguish between the following examples and determine which one is NOT creative work? a. software b. slogan c. screen
    15·1 answer
  • What are the three computer components that hold a dangerous amounts of electricity? Even when it’s unplugged.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!