1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
garri49 [273]
2 years ago
7

Susan wants to play the games that come with Windows on her computer, but they are not on the Start menu. What should she do in

this scenario
Computers and Technology
1 answer:
ollegr [7]2 years ago
5 0

Answer:

Search for the games in the search bar

Explanation:

You might be interested in
Gretchen has just started making a new presentation in a series of PowerPoint presentations. The default formatting for text in
Dvinal [7]

Answer:

text only

Explanation:

           

5 0
3 years ago
Which of the following is NOT a recommended characteristic for incident objectives?A. Stated in broad terms to allow for flexibi
docker41 [41]

Answer:

A. Stated in broad terms to allow for flexibility.

Explanation:

Incident command are controls or directives needed in production or in an organization. A few characteristics not incident command objectives are, all projects and targets must be measurable and attainable, aii hand on board must function in accordance with the incident commander's authorities, and every finished project must meet company quality standards and deadlines. The incident commander's authorities are fixed for a particular sector and is rigid.

6 0
3 years ago
Can you answer this ?​
beks73 [17]

Answer:

Answer it yourself.

Explanation:

NO.

4 0
3 years ago
Read 2 more answers
How do the portrait and landscape page orientations help in the process of printing a worksheet?
zmey [24]
Most worksheets are portrait orientation. A few of them are horizontal, but it depends on what you want to do.
6 0
3 years ago
What is the characteristics of a spear phishing message
Cerrena [4.2K]
It is targeted at one person specifically. More work for the attacker, but higher chances of obtaining sensitive information.
7 0
3 years ago
Read 2 more answers
Other questions:
  • Computer-aided manufacturing (CAM) offers which possible benefits?
    15·2 answers
  • Peter wants to protect a confidential document by using a password. He wants to use an asterisk and an ampersand symbol in his p
    10·1 answer
  • Your job as a researcher for a college is going well. You have gained confidence and skill at pulling data and you are not makin
    13·1 answer
  • ¿La tecnología ha esclavizado al hombre?
    15·1 answer
  • ______design A plan for the actual implementation of the system.
    9·2 answers
  • What is memory address map​
    7·1 answer
  • Why does this happen to me?
    14·1 answer
  • A folder is a collection of related of data is true or false​
    10·2 answers
  • Please please help ASAP it’s timed
    13·1 answer
  • 1. (01.03 MC) What is a string in Python
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!