1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tom [10]
3 years ago
12

If i keep giving out brainlyest will i get banned again?

Computers and Technology
2 answers:
attashe74 [19]3 years ago
6 0

Answer:

Explanation:

Yes, most likely

Dima020 [189]3 years ago
3 0

Answer:

yes ma'am

Explanation:

You might be interested in
To move or copy a range of cells, select the correct order:
Karo-lina-s [1.5K]

Answer:

Correct Order

2. Select the cell or range you want to move or copy.

1. Move the pointer over the border of the selection until the pointer changes shape.

3. To move the range, click the border and drag the selection to a new location, or to copy the range, hold down the Ctrl key and drag the selection to a new location.

Explanation:

To move or copy range of cells in MS Excel, You first select the cell/range you want to move or copy, hover the mouse pointer and take note when it changes shape, then finally click the border (when you noticed the change of shape of the pointer) and hold down the ctrl key and drag it to the destination location.

6 0
3 years ago
What are the importance of computer software​
Katen [24]

Answer:

It controls and coordinates all hardware and software functions within your PC. It is designed to be ever-improving so that newer tasks are performed more efficiently.

4 0
2 years ago
Read 2 more answers
A bin contains 100 sty le a notebooks, 100 style b notebooks, and 100 style c notebooks. antoine will select 3 notebooks from th
emmasim [6.3K]
<span>The answer is Ten.  Substituting numbers for letters, available selections are 111, 112, 113, 122, 123, 133, 222, 223, 233, 333.  Note that, for example, 112, 121, and 211 are considered as the same selection.
</span>AAA, BBB, CCC, <span>AAB, AAC, </span><span>BBC, </span><span>ABB, ACC, </span><span>CCB & ABC.</span>
7 0
4 years ago
A large data set contains information about all students majoring in computer science in colleges across the United States. The
Vsevolod [243]

Answer:

The correct option is B

B. How many states have a higher percentage of female computer science majors than male computer science majors attending college in that state?

Explanation:

A.We can not analyze that students majoring in computer science tend to have higher grade point averages than students majoring in other subjects because we are only given data sets about computer science not about other majoring subject students

B. Because data set contains attributes of gender and state so we can easily analyze that how many states have a higher percentage of female computer science majors than male computer science majors attending college in that state.

C.We can not analyze that what percent of students attending college in a certain state are majoring in computer science because data sets doesn't contain any information about students other computer science students.

D. We can not analyze that which college has the highest number of students majoring in computer science because data sets doesn't contain attribute of college name.

4 0
3 years ago
Which of the following is not a type of Internet Job Board? Options Resume Blaster Professional Association Target Applicants We
mr Goodwill [35]
The answer is : Weighted application blanks

Job board is a type of system in which the employers set up a list of requirements for the job hunter

Weighted Application blanks is used to to collect background information from the job applicants, which is not a part of job board
6 0
3 years ago
Other questions:
  • Jane is a postproduction crewmember for a film. Her responsibilities include arranging all the scenes that have been shot into t
    7·1 answer
  • What does nntp stand for?
    12·2 answers
  • Attempting to determine a password that is not known to the attacker is often called ____.
    13·1 answer
  • Some files appear dimmed in one of the default folders on your computer. What would be the best course of action? A. Leave the f
    5·1 answer
  • In the _____ phase of transferring data from a transactional database to a data warehouse, the builders create the files from tr
    15·1 answer
  • If a menu item requires additional information from the user, the Windows standard is to place a(n) ____ at the end of the capti
    12·1 answer
  • All sensitive media on a laptop should be encrypted.
    14·1 answer
  • Wake up to reality. Nothing ever goes as planned in this world. The longer you live,the more you realize that only pain, sufferi
    5·1 answer
  • Find the error in the following code fragment. int a: System.out.print(a):​
    12·1 answer
  • What do the last two steps in the cyclical design process most likely involve
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!