1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kogti [31]
2 years ago
7

Fill in the blanks with the correct words.

Computers and Technology
1 answer:
viva [34]2 years ago
4 0

Answer:

1) Horizontal

2) Insert

3) Adjustment

4) Cell Style

5) Option-numeric

Explanation:

You might be interested in
The _____________ RTN describes the overall effectof instructions on the programmer visible registers
mart [117]

Answer: Concrete

Explanation: Concrete RTN(register transfer notation) is a RTN that uses a certain set of registers and buses that are real for the completion of abstract RTN verdicts effect.They deal with the abstract RTN also for the registers transfer .They give the idea of the transferring of registers on the programmer's side and then defines the effect of it.

6 0
4 years ago
What would be a standard way for anyone outside an agile team( for example, delivery partner partner of the account, head of the
musickatia [10]

Answer:

He/She can refer the physical/digital kanboard ,which is maintained by the team

7 0
3 years ago
The frame work for storing records in database is a
andreev551 [17]
The frame work for storing records in database is a report. (b)
3 0
3 years ago
To see if a website is using a secure connection, what should you look for? Select all that apply.
kupik [55]

Answer:

– A web address using “HTTPS” (The extra “S”means it’s a secure connection. – Secure sites show a closed padlock emblem you can click on for security details – the most trustworthy sites will have green padlocks or address bars.

Explanation:

6 0
3 years ago
Select the correct answer.
Marina86 [1]
C: pie chart is the answer to it
4 0
3 years ago
Read 2 more answers
Other questions:
  • A device that produces a permanent human-readable text of graphic document.
    15·1 answer
  • Inkjet printers and laser printers are examples of ________ printers. (1 point)
    13·1 answer
  • An “evil twin” in the context of computer security is: a) A virus-laden attachment that looks just like a sincere attachment b)
    5·1 answer
  • What are the five layers in the internet protocol stack? What are the principal responsibilities of each of these lay?
    9·1 answer
  • Which of the following savings vehicles usually requires a high minimum balance?
    12·1 answer
  • Bios types that can be updated without removing the bios chip from a motherboard
    9·1 answer
  • 2 inventions revolutionized photography, what are they?
    10·1 answer
  • To answer the research question "How am I going to find the information I need on the tople?" the best thing Georgia should
    15·1 answer
  • Which state legislation requires companies to report security breaches within 48 hours
    6·1 answer
  • Read the scenario and then choose which type of
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!