1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mandarinka [93]
2 years ago
7

Rita used information from a blog that someone else wrote. What should she do?

Computers and Technology
1 answer:
Shkiper50 [21]2 years ago
7 0

Answer:

rita should either ask the original author for permission to use her blog, but the best answer woyuld be that she should site her sources.

Explanation:

You might be interested in
When storing used oil, it needs to be kept in ___________ containers.
tester [92]

Answer:

Plastic container

Explanation:

because if we use iron it may rust and oil may also damage

5 0
2 years ago
T<br> F<br> 5.<br> You can save presentations in PDF and XPS formats.
S_A_V [24]
True, presentations can be saved as PDF’s it will come out as separate pages though
7 0
2 years ago
An administrative assistant types a document, saves, and prints. The assistant is using _____.
9966 [12]
The answer to your question is software. 
3 0
2 years ago
Which of the following is NOT a place where you are likely to encounter a pedestrian?
AlexFokin [52]

Answer:

A. On a highway

Explanation:

On a highway is NOT a place where you are likely to encounter a pedestrian.

Pedestrians found on highways usually get arrested or get a ticket.

3 0
2 years ago
Read 2 more answers
what feature allows you to create a form letter or certificate and personalized it for different recipients by usin the info in
agasfer [191]

Answer:

mail merge is the answer to this one i believe

6 0
3 years ago
Other questions:
  • "what is the name of the ipsec configuration file"
    9·1 answer
  • Write a function named get_my_age that returns your age as an int (this is YOUR age, so if you were 21 you would return the numb
    11·1 answer
  • What type of social engineering attack uses email to direct you to their their website where they claim you need to update/valid
    6·2 answers
  • Listed items that are not in any particular order should be identified with
    8·1 answer
  • Data is best described as
    10·2 answers
  • Fre.....ee p......oint....s
    15·2 answers
  • If the fluid level in a battery is below the separators<br> should be added but never add
    5·1 answer
  • How do i know my child's login info for parent infinite campus
    14·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    6·1 answer
  • allows users to enter text and control the computer with their voice.allows users to enter text and control the computer with th
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!