1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oxana [17]
2 years ago
5

Which insert image option allows a user to compile, modify, and add captions to images?

Computers and Technology
2 answers:
navik [9.2K]2 years ago
7 0

Answer:

c. Photo Album is correct

Explanation:

egoroff_w [7]2 years ago
7 0

Answer:

C. Photo Album

Explanation:

You might be interested in
During critical thinking, the evaluation of information should use
nexus9112 [7]
False any critical thinking shouldn’t involve emotions
6 0
3 years ago
Read 2 more answers
A(n) _____ is the unit of network information NICs and switches work with.
morpeh [17]

Answer: Network card

Explanation:

 A network card is unit of the network information NIC (Network interface card) and worked with the switches. The working is basically perform at the given physical layer and subsequently organizing different types of devices that are physically associated together to execute as individual unit.  

The network interface card (NIC) is also known as network adapter and the ethernet card in the network. It is the expansion of the card that basically enable the computer system to connect with the networks.

7 0
3 years ago
What can you add to your presentation from the insert ribbon toolba?
stiks02 [169]

Answer:

anything you want

Explanation:

there are a lot of adons for powerpoint

7 0
3 years ago
an attack has changed the value of a variable used when copying files from one cloud server to a local drive. what is the most l
BaLLatris [955]

Based in the provided information, The attacker utilized integer overflow attack which could bring alteration to the state of the local drive's memory.

<h3>What is an attack in computer terms?</h3>

An attack can be regarded as violation of one's data or information on the computer system.

Since, the attacker, changed the value of a variable used when copying files from one cloud server to a local drive, his motive was alteration to the state of the local drive's memory.

Learn more about attack on drive at;

brainly.com/question/11352260

5 0
3 years ago
How do computers perform complicated tasks built from simple instructions?
wlad13 [49]
They use and perform a set of actions and programs that build on each other.
8 0
4 years ago
Other questions:
  • How to make a sad face on keyboard using alt?
    5·2 answers
  • Every employee of your company has a Google account. Your operational team needs to manage a large number of instances on Comput
    10·1 answer
  • For most applications, saving sound files at the _____ bit resolution provides a good balance of sound quality and file size.
    15·2 answers
  • PLZ HELP!! How does HTML help solve the problem of telling a computer what a web page looks like, not just the content that is o
    15·1 answer
  • Write the full form of E-mail?​
    6·2 answers
  • This study highlights that people access social networking sites to be
    12·1 answer
  • Which structural semantic will this HTML code snippet form?
    13·1 answer
  • Which type of malware prevents you from accessing files stored on your computer?
    10·2 answers
  • Enter a formula in cell C13 to look up the registration fee for the first vehicle. Use the vehicle type in cell C4 as the Lookup
    9·1 answer
  • Question 2 if you have a slow computer, what are some possible culprits that could be causing this? select all that apply
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!