1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuliya22 [10]
2 years ago
10

PLEASE HELP ILL MARK BRAINLIEST!!!

Computers and Technology
1 answer:
tiny-mole [99]2 years ago
6 0

Answer:

B. Acknowledge the sources of the images

You might be interested in
Before inserting a preformatted table of contents, what must you do first?
vova2212 [387]

Answer: apply heading styles to text.

Explanation:

6 0
2 years ago
12.
melisa1 [442]
The correct answer is 1.6
7 0
2 years ago
An IT security threat is anything that might cause serious harm to a computer system.
Blababa [14]

Answer:

True

Explanation:

this is true because a threat can endanger the computer and its system

5 0
2 years ago
Word processing software, spreadsheet software, database software, and presentation software are examples of what category of co
wariber [46]
The correct answer is letter B. Application Software. Word Processing software, spreadsheet software, database software, and presentation software are examples of Application software. These are applications that are mostly output based.
8 0
3 years ago
Which of the following IS true about usnig the Hatch command ?
xeze [42]

Answer:

What is the following?

Explanation:

There is no following listed, so I can't help you.

6 0
3 years ago
Other questions:
  • Using Task Manager, you discover an unwanted program that is launched at startup.
    13·1 answer
  • O novo funcionário da equipe de desenvolvimento de sistemas está aprendendo os termos mais utilizados no dia a dia da empresa. A
    7·1 answer
  • Rint "Censored" if userInput contains the word "darn", else print userInput. End with newline.
    11·1 answer
  • How is a ink pen better than a digital pen.
    8·1 answer
  • __________ was awarded the Nobel Prize in physics forhis work on the photoelectric effect.
    13·1 answer
  • What happens when you call someone whose phone is off?
    6·2 answers
  • Eliza needs to share contact information with another user, but she wants to include only certain information in the contact. Wh
    9·2 answers
  • Question<br> 1. Who was the first to use an abacus
    6·1 answer
  • How is scale depicted on a flat video screen?
    13·1 answer
  • Are there any Potential Dangers in Artificial Intelligence?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!