1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xxTIMURxx [149]
3 years ago
6

Which of the following steps should you take after attending a college fair?

Computers and Technology
2 answers:
Svetlanka [38]3 years ago
6 0
B and c are obviously wrong. it can’t be d because you shouldn’t rush into college so soon and you need to make good decision. so A.
leonid [27]3 years ago
5 0

D. Make a decision about which colleges to attend that night.

You might be interested in
Question #5
Anestetic [448]

Answer:

d;  attribute

Explanation:

8 0
3 years ago
Read 2 more answers
The groups within a tab are collectively<br> known as?
vagabundo [1.1K]

Answer:

the ribbon

Explanation:

Commands are organized in logical groups, which are collected together under tabs. Each tab relates to a type of activity, such as formatting or laying out a page. To reduce clutter, some tabs are shown only when needed.

6 0
3 years ago
Which tool would you use if you wanted to arrange a list of words in alphabetical order?
dem82 [27]
Answer:
A
Explanation:
You can quickly and easily sort the text of a bulleted or numbered list in Microsoft's popular Word program so that your text is in alphabetical order. In the Sort Text dialog box, under Sort by, click Paragraphs and Text, and then click either Ascending or Descending.
5 0
3 years ago
Read 2 more answers
What is copyrights used for​
Inga [223]

if something belongs to someone it makes it so someone else cannot steal it and claim it to be their own

4 0
3 years ago
Read 2 more answers
You want to implement 802.1x authentication on your wireless network. Where would you configure passwords that are used for auth
irakobra [83]

Answer:A RADIUS server provides authentication through a user name and password encrypted with EAP.

Explanation:

7 0
3 years ago
Other questions:
  • A security system uses sensors at every door and window which will set off an alarm if any one of them is opened. There is also
    13·1 answer
  • With network management software, a network manager can ____.
    6·1 answer
  • If you think the user might enter 24.9, you should create a float variable. true or false
    9·1 answer
  • show how one version of the technology is an improvement over a previous iteration of that same technology
    11·1 answer
  • What will the output be from the following program?
    5·1 answer
  • You're researching information about titanium bike frames. Which Web site is probably the least biased? The web site of a nation
    6·1 answer
  • Which tab automatically becomes available after inserting a text box? Drawing Tools Insert Text Box Tools Shape Tools
    15·2 answers
  • 8.10 quiz edhesive A swap is: a variable used to find the smallest value in an array an algorithm used to find a value in an arr
    12·1 answer
  • Mario kart is mercedes lol
    13·2 answers
  • Which option is an example of an algorithm that is used in daily life?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!