1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svetlana [45]
2 years ago
11

Which function would you use to make sure all names are prepared for a mailing label? TODAY UPPER PROPER LOWER

Computers and Technology
1 answer:
Aleonysh [2.5K]2 years ago
5 0

Answer:

Proper.

Explanation:

You might be interested in
Want to.learn about computers​
MAVERICK [17]
Yes...I do want to learn about computer
6 0
3 years ago
anyone got a class named computer literacy? or sum similar to using Microsoft programs? i need a lotttt of help, im 3 units behi
seropon [69]

Answer:

I use google docs

Explanation:

I am in 6th grade but i am in expert in computers.

6 0
3 years ago
Read 2 more answers
If one breakfast meal of banana lacatan, scrambled egg, plain rice, and hot milk contains 58 grams carbohydrate, 12 grams protei
enyata [817]

Answer:

Total amount of calories = 325

Explanation:

Given:

Amount of carbohydrate = 58 gram

Amount of protein = 12 gram

Amount of fat = 5 gram

Find:

Total amount of calories

Computation:

1 gram protein = 4 calories

1 gram carbohydrate = 4 calories

1 gram fat = 9 calories

Total amount of calories = (58)(4) + (12)(4) + (5)(9)

Total amount of calories = 232 +48 + 45

Total amount of calories = 325

5 0
3 years ago
President Roosevelt's Fireside Chats were:
larisa86 [58]
C. Entertaining radio shows that families listened to in the evening. He did these chats to inform the public on what he was going to do about the problems facing the public.
3 0
3 years ago
Read 2 more answers
What is a cyber crime?<br><br>help
algol [13]

Answer:

cyber crime, also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child p0®n0graphy and intellectual property, stealing identities, or violating privacy. Cyber crime, especially through the Internet, has grown in importance as the computer has become central to commerce, entertainment, and government.

3 0
2 years ago
Read 2 more answers
Other questions:
  • A web page that integrates content and scripts from multiple web sites to create new applications is known as a:
    13·1 answer
  • What was the process called that required the photographer to have a tent or darkroom handy so that chemicals could be mixed qui
    7·1 answer
  • To more easily incorporate methods into a program, it is common practice to store methods in their own classes and files. Then y
    6·1 answer
  • What is TLB for? Why TLB? Given the following number, what is theeffective memory access time?
    11·1 answer
  • Write a program to enter a number and test if it is greater than 45.6. If the number entered is greater than 45.6, the program n
    10·1 answer
  • The terms Apps and Applications can be used interchangeably about software installed
    8·1 answer
  • Podcasts can only be created by professional organizations
    11·2 answers
  • Does "remainder of x from y" mean xmody?
    5·1 answer
  • CreatePolicies<br> I need help with this in java.
    8·1 answer
  • State the functions of the parts of the computer​
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!