1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Shalnov [3]
3 years ago
13

Which type of image is composed of lines, curves, and fills?

Computers and Technology
1 answer:
Nataliya [291]3 years ago
4 0
<h2>Answer: Vectors</h2>

Explanation:

You might be interested in
When a formula includes a cell reference, Excel interprets that cell reference as being located relative to the position of the
blagie [28]

Answer:

True

Explanation:

Cell reference or cell address is defined as a union of a column letter and a row number that recognize a cell on a worksheet.

5 0
3 years ago
Which of the following characteristics of an e-mail header should cause suspicion?A. Multiple recipientsB. No subject lineC. Unk
julsineya [31]

Answer:

The correct answer for the given question is option(b) i.e " No subject line"

Explanation:

In the e-mail subject is the important part which describe the information which kind of particular mail is send or received .if we do not give any subject line in the e-mail header then most of the chances that email will not read by recipients due to this suspicion will be caused.

Unknown Sender and Multiple recipients do not cause suspicion so the correct answer is option(b) i.e No subject line".

3 0
3 years ago
Never mind I got it
sergiy2304 [10]
<span>She is estimating the future profits with an estimate of long-term sales and the actual cost incurred.</span>
5 0
3 years ago
Read 2 more answers
Which programming language's program structure is similar to its syntax?
sashaice [31]

Answer:

I believe it is java.

Explanation:

8 0
3 years ago
What is self management​
never [62]

Answer:

when you manage or construct something by yourself, taking full reponsiblity, etc

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • Technlogies are having a negative impact on business true or false
    7·1 answer
  • For your biology class, you have taken a number of measurements for A plant growth experiment. you wish to create a chart that s
    6·1 answer
  • List the applications in the CyberOps menu.
    15·1 answer
  • The Department of Homeland Security only deals with threats to national security and does not play a role in helping companies m
    13·1 answer
  • My computer just fried anybody know why it did that?
    14·2 answers
  • A technician has been asked to upgrade a processor and needs to do some research. The computer is just a couple of years old. Wh
    13·1 answer
  • in a typical e-mail address, the "host" is A. an account designated by a user name B. CPU processor 2500 C. the receiver of an e
    12·2 answers
  • Visit on social networking site and look for the site's privacy policy.The link is typically found at the bottom of the page and
    9·1 answer
  • What is a digital dashboard, and why are they becoming an increasingly popular tool?
    15·2 answers
  • Please help!!!!!!! 50 POINTS!!!!
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!