1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
taurus [48]
3 years ago
9

Which of the following best describes a toolbar?

Computers and Technology
1 answer:
nataly862011 [7]3 years ago
3 0
Easy fast access to common apps or programs

You might be interested in
In a block-style business letter, the paragraphs are double-spaced and indented. <br> True or False
Sav [38]
I am pretty sure it is true
5 0
2 years ago
Read 2 more answers
Write a program that has a conversation with the user. The program must ask for both strings and numbers as input. The program m
konstantin123 [22]

Answer:

yo im sorry eat my cookie

Explanation

doorkoeeworkwoeroewkrwerewrwe

5 0
3 years ago
What is the proper citation for a video source? A. Video: Hank Aaron. Dir. Don Donto. VidCassette. 1985. DVD. Home Video, 1986.
VashaNatasha [74]
The answer it had to be B
6 0
2 years ago
Data values in a program are held in _________. a data types b names c variables d lockers
Tpy6a [65]

Answer:

Answered below

Explanation:

Data values in a program are held in variables. Variables are like containers for holding different types of data. A variable can be identified depending on the kind of data it holds. Variables can hold data types of integers, strings, arrays, lists, sets, Boolean etc. They hold unique data types and a can not hold different data types. Different rules exist for naming variables in different programming languages. A variable name should start with lowercase letters and be descriptive of the data it holds.

7 0
3 years ago
Larry recently viewed an auction listing on a website. as a result, his computer executed code that popped up a window that aske
RUDIKE [14]
<span>Larry recently viewed an auction listing on a website. as a result, his computer executed code that popped up a window that asked for his password. The type of attack larry had likely encountered is the </span><span>Cross-site scripting (XSS).</span>
4 0
3 years ago
Other questions:
  • Which of the following can be sources of sediment? A. fragments of other rocks B. chemicals and minerals dissolved in water C. s
    11·1 answer
  • Crop marks are used on an illustration to indicate to the printer the
    10·1 answer
  • Within the try clause of a try statement, you code a. all the statements of the program b. a block of statements that might caus
    14·1 answer
  • Mason is part of a project team that is creating a television advertisement. List one risk the team faces and a strategy for min
    5·1 answer
  • Which part of project management involves determining the overall work? Breakdown Incomes Scope Time
    15·1 answer
  • Complete the body of the decrement static method using only the NaturalNumberKernel methods (multiplyBy10, divideBy10, and isZer
    10·1 answer
  • A marketing firm has been hired to help a client understand how their online brand is perceived. The firm has set up a system to
    14·1 answer
  • PLEASE HURRY!!!!<br> Look at the image below
    8·1 answer
  • Is windows CUI operating system??<br><br><br>What is the main purpose of folder ????<br><br><br>​
    15·1 answer
  • Which of the following is not considered essential for an electronic device to be called a computer?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!