1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vaieri [72.5K]
3 years ago
12

How do u complete lesson 10: course 2 variables with artist ​

Computers and Technology
1 answer:
Stels [109]3 years ago
4 0

Answer:

ano daw di ko g

Explanation:

gaineissk

You might be interested in
Which of the following is a database concept that allows for storage and analysis for a dozen to billions of data points?
nydimaria [60]

Answer:

C) Storage

Explanation:

I am sure of it.

5 0
3 years ago
What type of computer would integrate the system unit with the display and keyboard?
kolbaska11 [484]
Pc
hope this helps have a good day

3 0
3 years ago
When you create names for the elements of a webpage (such as ), what are some rules that you can follow to make your HTML code e
shusha [124]

Answer:

by using proper indentation

Explanation:

6 0
3 years ago
Read 2 more answers
What field would you use to store a value from another table?
Levart [38]

Answer:

A. Lookup

Explanation:

You would use the Lookup field to store a value from another table.

7 0
4 years ago
When working with a large worksheet, you can split the window into ____ panes.?
krek1111 [17]
When working with a large worksheet, you can split the window into two or four panes.
5 0
4 years ago
Other questions:
  • Elvis has asked Bonnie out on a date to a baseball game. Elvis is a friend of Bonnie's classmate Ginger and she has met him a fe
    5·2 answers
  • The ........ tag is used to create a link to another document​
    9·1 answer
  • Explain with the help of an example that family background affects the entrepreneurial behaviour of people
    12·1 answer
  • You work for a company that does network cable installations. Your company has been contracted to pull out the existing CAT 3 wi
    11·1 answer
  • Voice authentication requires speech to text capability Facial recognition may be used for authentication The human iris is uniq
    6·1 answer
  • In his digital portfolio, Ben wants to locate each work he created. Where can he list details about the work in his digital port
    7·2 answers
  • I can't solve this <br> Python loop with while statement
    15·2 answers
  • Which protocol is well known for its use in the the home security and home automation industry, uses a mesh topology, makes devi
    7·1 answer
  • Name the first mechanical computer​
    11·1 answer
  • How does microsoft label mac addresses in the windows utilities that show you the mac address?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!