1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ksivusya [100]
2 years ago
9

Which of the following are ways that

Computers and Technology
1 answer:
Viefleur [7K]2 years ago
3 0

Answer:

A and b

Explanation:

You might be interested in
Niall is revising a history assignment using a word processor on a Windows computer. He wants to copy a section from an earlier
Zarrin [17]

Answer:Ctrl + V

Explanation:

7 0
2 years ago
Next, let's examine what happens when you apply a style to an element that contains other elements. The body element in the HTML
CaHeK987 [17]

Answer:

When the body element CSS color style was changed, The color of all the text in the HTML file changed to the specified color, the same goes for font-size, font-weight, etc.

Explanation:

HTML or hypertext markup language is a markup language used in web development to implement the position and structure of the web page. It has no style, so, CSS or cascading style sheet is used to style the HTML elements in the web page.

4 0
2 years ago
Int someFct (int N)[
Allisa [31]

Answer:

solution attached.

Explanation:

Also, the tetha time complexity of T_upper would be 2^{\frac{n}{3} }

3 0
2 years ago
What types of data sources could be used in a mail merge? Check all that apply.
krok68 [10]

<u>The types of data sources that could be used in a mail merge are:</u>

  1. Word tables
  2. a database
  3. an excel sheet
  4. an outlook contacts list

<u>Explanation:</u>

Mail merge allows one to send a particular document to different individuals.  It is generally used in office environment where some information is to be communicated  to a number of people. The information is attached by adding the data sources.

Mail merge comprises of joining mail and letters and pre-tended to envelopes or mailing names for mass mailings from a structure letter.

In database mail merging it is embedding it into reports, for example, letters, mailing marks, and unofficial IDs.

Tables assist you with exhibiting data in an unmistakable and sorted out way. Tables are helpful for different assignments, for example, introducing content data and numerical information.

In excel the component in Microsoft Word and Excel streamlines the way toward sending a similar report with customized changes to a few beneficiaries.

In outlook contacts, the wellspring of customized data in a bunch of Word reports, through Word's mail blend include through Word's mail merge feature.

8 0
3 years ago
Read 2 more answers
Which of the following software is unique to a Mac?
kherson [118]
Pages is owned by apple and thats what my mac has default
6 0
3 years ago
Read 2 more answers
Other questions:
  • _____ provides vital protection and maintenance services for system hardware and software, including enterprise computing system
    12·1 answer
  • Where in the Formula tab on the ribbon would you find the Use in Formula function?
    11·2 answers
  • Which statements accurately describe the Bookmark feature in the Audio/Video control bar? Check all that apply.
    13·1 answer
  • What error occurs in the following program? #include using namespace std; int main() { int number1, number2, sum; cout &lt;&lt;
    13·1 answer
  • For example, consider a file with protection mode 644 (octal) contained in a directory with protection mode 730. How might the f
    9·1 answer
  • Why is simplicity important in navigation design?
    13·1 answer
  • Which century saw the development of letterpress printing?
    10·1 answer
  • Which software programs should students avoid using to create and submit course work? (Choose all that apply). Word, Pages, Numb
    13·1 answer
  • If you are using a sprite for your MakeCode Arcade game, which code block
    7·2 answers
  • A Network Intrusion Detection System watches for potentially malicious traffic and _______ when it detects an attack.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!