1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Deffense [45]
3 years ago
7

45 points

Computers and Technology
1 answer:
Korolek [52]3 years ago
5 0

Answer:

5 its either a or b and 6 is b 7 is d  and 8 t 9 f 10 f

Explanat ion:

You might be interested in
In Word, how can you tell when text is selected?
Anit [1.1K]

Answer:

the text will highlited in gray

Explanation:

5 0
3 years ago
Place the steps in order for manually creating a New Contact Group
mote1985 [20]
Click new

Add members

Name the group

Save and close
5 0
3 years ago
Read 2 more answers
The distance that light travels in a vacuum in one year is a(n) _____. A. AU B. parsec C. light-year D. kilometer
Andru [333]

Answer:

light year

Explanation:

Its is equal to 9,500,000,000,000km

5 0
3 years ago
To copy and paste from an excel workbook to a word document, you must first
Firlakuza [10]
Select the cells to copy. Then push CNTL+C to copy them. Next, click the cells you want to paste in. Finally, push CTRL+v to paste
5 0
3 years ago
1. Name the first PC virus.<br> 2. In which language are viruses written for Microsoft programs?
Tju [1.3M]

Answer:

The first IBM PC virus in the "wild" was a boot sector virus dubbed (c)Brain, created in 1986 by Amjad Farooq Alvi and Basit Farooq Alvi in Lahore, Pakistan, reportedly to deter unauthorized copying of the software they had written. The first virus to specifically target Microsoft Windows, WinVir was discovered in April 1992, two years after the release of Windows 3.0.

Explanation:

HOPE THIS HELPS

6 0
3 years ago
Read 2 more answers
Other questions:
  • While there are many types of sediments, those that make up sedimentary rocks must be transported by running water.
    9·1 answer
  • What is the name of the process that is used to establish whether or not a user’s identity is legitimate?
    7·1 answer
  • The difference between the various networks is the ______ of the coverage.
    11·2 answers
  • Why does world of tanks keep downloading when I'm not even at the computer
    9·1 answer
  • What is the most significant issue that needs to be addressed when ensuring the proper functioning of a computer?
    7·1 answer
  • What is the function of the &lt; !Doctype &gt; tag?
    12·2 answers
  • You are a network administrator for a company that has two buildings. You are setting up a wireless network so users can maintai
    8·1 answer
  • Java: Programming Question: Reverse OrderWrite a program that reads ten integers into an array; define another array to save tho
    10·1 answer
  • What is a non-example for job application???
    11·1 answer
  • Choose the term that best matches the definition.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!