1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Viktor [21]
2 years ago
11

What are the steps to view two different versions of the same document at once?

Computers and Technology
1 answer:
Misha Larkins [42]2 years ago
3 0

this seems like a hard question I ain't got no idea

You might be interested in
I need help please?!!!
PolarNik [594]

Answer:

Turn on the defroster. obv

Explanation:

7 0
3 years ago
Read 2 more answers
Have y’all enjoyed The new hero floryn from Mobile legends
Angelina_Jolie [31]

Answer:

yo! but I'm a ex-mobile legends

5 0
2 years ago
Please Answer Quickly.<br> Match the item on the left with the reason that it is false on the right.
Varvara68 [4.7K]

Answer:

me desculpe mais eu preciso de pontos para ajudr meu irmão autista

5 0
2 years ago
A user’s laptop hard drive contains sensitive information. The user often plugs the laptop into the corporate network. A sensiti
jekas [21]

Answer:

the user should disable file and print sharing on the laptop

Explanation:

According to my research on information technology and cyber security, I can say that based on the information provided within the question in order to prevent this the user should disable file and print sharing on the laptop. This is because this file and printer sharing allows users to see your files that you have available as shared and copy or print those files. Which if they are sensitive data you should just disable this option so that people on the same network cannot see or access these files.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
3 years ago
How can you tell if your car is overheating?
Nitella [24]
A) your temp gauge is moving into red
4 0
3 years ago
Read 2 more answers
Other questions:
  • What is the outlined area called?
    6·1 answer
  • In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-p
    15·1 answer
  • How does modularity provide flexibility in a structured programming design?
    6·1 answer
  • An algorithm is defined as a well-ordered collection of unambiguous and effectively computable operations that when executed pro
    10·1 answer
  • Witch of the following is a valid why a scientist might a scientific theory
    13·1 answer
  • Which of the following is productivity strategy for collaboration?
    6·1 answer
  • Mississippi law codes state that bullying and cyberbullying are against the law. A court can decide to incur ___________________
    10·1 answer
  • Which visual aids can be used to present large amounts of numerical data from multiple sources? Check all that apply.
    7·1 answer
  • Film’s importance in today’s economy?
    12·1 answer
  • The WordPress Widgets submenu is located where on the WordPress site?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!