1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Schach [20]
3 years ago
11

Please help me figer out hot to change the letter to a C

Computers and Technology
2 answers:
I am Lyosha [343]3 years ago
5 0

Answer:I

I do not know sorry, but I will try and see if I can sear how to do it..

Explanation:

BlackZzzverrR [31]3 years ago
3 0

Answer:

find where it says d and delete it and add a c

Explanation:

but if you reload it will go back to normal

You might be interested in
Tom only thinks about his own gain and does not care about the team objectives. What quality is he demonstrating? A. resourceful
Grace [21]

Answer:

D. Selfishness

Explanation:

Selfishness is caring about yourself and not others

8 0
3 years ago
Which one of these are a valid IPv4 address?
Harman [31]

Answer:

1.1.1.1, 54.45.43.54, and 255.255.255.0

3 0
2 years ago
Which step of creating a financial budget involves listing the payroll, rental, and utility costs?
Bingel [31]

Answer:

A. planning and gathering financial information

4 0
3 years ago
Read 2 more answers
Question 15 of 25
GaryK [48]
It gains purchasing power. Less money in circulation = more value.
5 0
3 years ago
To save your new document or presentation, click the Start Button
Vika [28.1K]
No you would click save or save as
3 0
3 years ago
Other questions:
  • What is an activity that can help you enhance the appearance of your computer’s desktop?
    12·2 answers
  • Kai is a software engineer who started his own IT consulting firm. His friend, Catalina, is the owner of a store that sells offi
    13·2 answers
  • The ____ category of apps makes the computer easier for blind people to use.
    9·1 answer
  • Who is responsible for ensuring the security of business systems and developing strategies and safeguards against attacks by hac
    9·1 answer
  • The Spanning Tree Protocol operates at the Network layer of the OSI model.
    13·1 answer
  • Set methods are also commonly called _____ methods, and get methods are also commonly called _____ methods.
    6·1 answer
  • Examples of email use that could be considered unethical include _____.
    14·2 answers
  • 72. In Object Oriented Programming, a class_____ starts
    12·1 answer
  • Look at the picture ​
    13·2 answers
  • Tasha grew up helping her uncle work on cars in his auto repair shop and developed into an excellent auto technician. Because of
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!