1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ICE Princess25 [194]
3 years ago
13

When using the Photo Album dialog box, a picture

Computers and Technology
2 answers:
natima [27]3 years ago
6 0

Answer:

O cannot be modified in this view.

O cannot have te added.

O can be inserted from a file or disk.

O will be permanent when added to the box

Anon25 [30]3 years ago
6 0

Answer:

Explanation:

For a Photo Album, it must allow a picture to be added and modified. The picture can be deleted later as it is not permanent.

So the answer is a picture can be inserted from a file or disk.

You might be interested in
If someone has the IP address 127.0.0.1 and tries to connect to the address 127.255.252.255, which are they attempting to connec
sertanlavr [38]
B is the answer i think
6 0
3 years ago
A company needs to store its documents in one place, share news and information with all staff, and allow access for employees w
Greeley [361]
An NAS
Would do The Trick
4 0
3 years ago
According to the SANS Institute, a __________ is typically a document that outlines specific requirements or rules that must be
nata0808 [166]
That’s should be in the quizlet I think..
7 0
3 years ago
Users report that the database on the main server cannot be accessed. A database administrator verifies the issue and notices th
navik [9.2K]

Answer: (C) Ransomware

Explanation:

The ransomware is one of the type of malware software design which is used for blocking the user accessing unauthorized and also without paying money.

The most of the ransomware software encrypt the computer accessing and the files as they demand for the payment dues for again restoring the access.  

It also encrypt the user account and the information until the correct decrypt key are get entered into the system. So, according to the given situation, the ransomware attack are experienced in an organization.  

Therefore, Option (C) is correct.

4 0
3 years ago
Does excel have more than 400 functions
castortr0y [4]
Yes excel has more than 400 functions
7 0
3 years ago
Other questions:
  • What is one word for inventiveness uncertainty and futuristic
    5·1 answer
  • (Financial application: compound value) Suppose you save $100 each month into savings account with an annual interest rate of 5%
    6·1 answer
  • Your friend is working on fixing their Homework assignment. They need a lot of help. You know all the bugs in the file, but due
    12·1 answer
  • Steps for turning off two step verification on ,for example, iPhones.
    7·1 answer
  • Which of the following operations would best allow you to place 3D building models at their proper height on the terrain (e.g.,
    8·1 answer
  • In what decade did the Internet begin to be used widely by the public and not just government entities?
    5·2 answers
  • A smart refrigerator can use what to detect when you are running low on milk, and then send a reminder to you on a wireless.
    8·1 answer
  • Which wildcard characters will return a single character when using the Find dialog box?
    6·2 answers
  • Host Y sends the first TCP ACK message for the transaction?<br><br> a. true<br><br> b. false
    9·1 answer
  • 54 points!!! Cyber security
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!