1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BartSMP [9]
3 years ago
12

Gn guys have an Amazing day!

Computers and Technology
2 answers:
Tema [17]3 years ago
8 0
Brainliest please bc you are very awesome
Viktor [21]3 years ago
4 0

what???

just admit it

You might be interested in
Which term describes a visual object such as a picture, a table, or a text box?
Nat2105 [25]

Answer:

A) Caption

Explanation:

This option makes the most sense. It's not Word Art or Comment. An illustration is like a drawing, so that's incorrect as well, leaving only caption as the correct answer.

Hope it helps!

8 0
3 years ago
Read 2 more answers
How can i do a back up on one computer and save it to the hard drive in another computer without it being seen by others on the
Ganezh [65]
Unless you share the backup HD only the local user is going to see it. Given that it's a server, it's not a problem. You can also hide the backup with attributes +h +s and many other ways.
8 0
3 years ago
A school principal trying to find out if parents will help buy new playground equipment shows digital leadership by.
ELEN [110]

Answer:

D. is the correct answer!

8 0
4 years ago
Read 2 more answers
What does the term World Wide Web refer to?
Katena32 [7]
The internet because its world wide because our computers and everything are all inter twined making a world wide web Hope this helps
3 0
3 years ago
Read 2 more answers
If you want help using drawing, word processing, and e-mail programs, the best place for you to find it is through the Start men
ZanzabumX [31]

Answer:

True

Explanation:

True

5 0
3 years ago
Other questions:
  • Using a database of precomputed hashes from sequentially calculated passwords called a(n) __________, an attacker can simply loo
    14·1 answer
  • . Once a vulnerability has been identified by Nessus, where would you check for more information regarding the identified vulner
    15·1 answer
  • Which port-authentication network access control standard forces devices to go through a full authentication, authorization, and
    13·1 answer
  • With the ease of the Internet, it is not uncommon for individuals to copy skills from resume templates to make themselves look m
    9·1 answer
  • If a*b = 2a - 56, calculate the value of<br>3 * 4​
    14·1 answer
  • The _device provides a means of communication between a computer and outer world.​
    14·1 answer
  • Write any four difference between email and effects​
    14·1 answer
  • What is a benefit of the rise in citizen journalism? Multiple answer choice below
    13·1 answer
  • PLEASE HELP WILL GIVE BRAINLIEST!!!’
    15·1 answer
  • Is e commerce a challenge or opportunity to the freight forwarder
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!