1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lutik1710 [3]
2 years ago
15

Omar is ready to print the outlines. Which tab should he use to access the Print pane?

Computers and Technology
2 answers:
ruslelena [56]2 years ago
7 0

Answer:

A File

Explanation:

Correct on Edg

vivado [14]2 years ago
3 0

Answer:

A. File

Explanation:

Edg2020

You might be interested in
Why is compression a "hard problem" for computers? Draw on your own experience compressing text with the text compression widget
forsale [732]

Answer:

Compression is hard since we usually find it difficult to determine the best compression rate .

When using the text compression widget we make a key that represent every work we have repeated in order to decrease the stored data.

When you have extends you compression beyond what it should be it is easy to notice since there will be no algorithm and that makes it hard hence we end up making assumptions on what ratio we will use for compression by using a thorough key.

5 0
3 years ago
Four examples of computer virus​
Nikitich [7]

Virus that infects files. Macro Virus is a virus that attaches itself to an executable application. This type of virus is commonly found in Microsoft Word or Excel programs.... Browser Hijacker.... Web Scripting Virus.

Good morning, I hope this helps, and if you don't mind, please mark me as brainliest ❤

4 0
3 years ago
What arw two reasons for maintaning your privacy on the internet
Mekhanik [1.2K]

Answer:

so people can't get your information and use it to their advantage and because you never know what people could do with that information

Explanation:

8 0
3 years ago
Read 2 more answers
How can you protect your information when using wireless technology
Mnenie [13.5K]

Answer: Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals.

Explanation:

8 0
2 years ago
The top of a ladder must extend how many feet above the surface a worker is climbing onto?
Alika [10]
<span>The answer is THREE FEET. This is part of the safety precautions that must be taken when using ladder. Other safety precautions include: only used inspected and certified ladders, keep ladders at least ten feet away from power lines, do not use ladder on slippery surfaces, etc.</span><span />
6 0
3 years ago
Other questions:
  • The number of bits used to store color information about each pixel is called ____.
    13·1 answer
  • What are some good editing software apps for pc?
    11·1 answer
  • Explain how the principles underlying agile methods lead to accelerated development and deployment of software.
    6·1 answer
  • To copy the formatting of one control to other controls, use the ____ button on the form design tools format tab.
    7·1 answer
  • The difference between a want and a need is a want is not necessary for survival. Things necessary for survival are known as ___
    6·1 answer
  • You want to establish the validity of a test designed for computer technicians using a predictive criterion-related validation s
    9·1 answer
  • Waygate's residential Internet modem works well but is sensitive to power-line fluctuations. On average, this product hangs up a
    6·1 answer
  • Speed(?)
    5·1 answer
  • When looking at security standard and compliance, which three (3) are characteristics of best practices, baselines and framework
    8·1 answer
  • What component of a game makes victories feel earned and helps the player become physchologically engaged by the play experience
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!