1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Korvikt [17]
3 years ago
6

Word provides a quicker way through the

Computers and Technology
1 answer:
Greeley [361]3 years ago
4 0
You didn't finish your question 

You might be interested in
Which of these is NOT one of the three parts to the event-handling mechanism in Java?
Tamiku [17]

Answer:Event action

Explanation:Event-handling mechanism is the technique through which the  the management of any event is Java is controlled and coordinated. The event handler code is used for the managing of the mechanism and execution.

Event action is not a part of the event handling mechanism in the java because no such step comes under the code of event handler and rest other option are present in java event handler.

5 0
3 years ago
What is the current through R1?
patriot [66]
I = V/R. So the answer is 9/200 = 0.045A = 45mA which is B
8 0
3 years ago
10 points if right...
aivan3 [116]

email because with chat it might wake up the kids and wbsite doesnt make sense. neither does blog so with email you can give personal messages and pictures.

7 0
3 years ago
Read 2 more answers
write a python function that takes string j and returns a dictionary showing number of letters and digits in j. The returned dic
k0ka [10]

Explanation:

def letterDigitCount(j):

dic={"digits":0,"letters":0}

for a in j:

if a.isdigit():

dic["digits"]+=1

elif a.isalpha():

dic["letters"]+=1

return dic

3 0
3 years ago
Quiero borrar mi cuenta como le hago ?
ollegr [7]
I want to delete my account as i do 
that is what google translate says<span />
6 0
3 years ago
Other questions:
  • Connected contacts require___ to open.
    11·1 answer
  • Assume we perform a known-plaintext attack against DES with one pair of plaintext and ciphertext. How many keys do we have to te
    14·1 answer
  • Place the steps in order to link and place text into the document outline, effectively creating a master document.
    8·1 answer
  • You have stumbled on an unknown civilization while sailing around the world. The people, who call themselves Zebronians, do math
    11·1 answer
  • ) how many bits are used for host number on the child network (subnet) , b) how many usable addresses can exist on this child ne
    9·1 answer
  • Write a program in qbasic to accept a character and check it is vowel or consonant​
    14·1 answer
  • How has your perspective changed since the beginning of the class?
    5·1 answer
  • The picture above is a description of the C code below. Please modify the C below so that it uses FILE HANDLING (fopen, fputs, f
    5·1 answer
  • Dunbar's number, 150, refers to the number of:
    5·1 answer
  • In the broadest of terms, the performance management process features a cycle that begins with ________________ and concludes wi
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!