1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Usimov [2.4K]
2 years ago
10

What is this on g00gel Document, and how do I fix it?

Computers and Technology
2 answers:
4vir4ik [10]2 years ago
7 0

Answer:

what

Explanation:

Hitman42 [59]2 years ago
6 0
Where is the picture or example? i could potentially assist you.
You might be interested in
What is one way to maintain Internet safety? a) avoid interacting with people on the Internet. B) avoid giving out information a
Anarel [89]
To be safe on the Internet, we must avoid giving out personal information.
4 0
3 years ago
Which of the following is not the name of an air mass?
Rus_ich [418]
<span>All the terms are adjectives, not names of air masses. But among the adjectives, tepid seems to be the odd one out.</span>
5 0
3 years ago
While a computer is running the operating system remains in memory. true or false?
MrMuchimi
While a computer is running the operating system remains in memory is true.
8 0
4 years ago
A network technician configures a firewall’s ACL to allow outgoing traffic for several popular services such as email and web br
Cerrena [4.2K]

Answer: (B) Allow the firewall to accept inbound traffic to ports 80, 110, 143, and 443

Explanation:

Port 80 is used by HTTP, 110 by pop3 to retrieve emails from web servers, 143 by imap for internet messaging and 443 is used for TCP for websites using SSL. So if the firewall is allowed to accept inbound traffic to these ports 80,110,143 and 443 then it would be possible to retrieve emails.

3 0
3 years ago
List out the process of Assembly in the film editing process. NO LINKS. answer ASAP
kobusy [5.1K]

Answer:

just try your best

Explanation:

7 1
3 years ago
Read 3 more answers
Other questions:
  • _____ is an information-analysis tool that involves the automated discovery of patterns and relationships in a data warehouse.
    12·1 answer
  • If you are planning to carry a large balance on your credit card, which of the following credit card features should you look fo
    7·2 answers
  • Esther has acquired an associate's degree in information technology and certifications in PageMaker and Illustrator. Which caree
    8·2 answers
  • What task did the u.s. government undertake that many people identify as the birth of the internet
    5·2 answers
  • In 1-2 pages, identify a social networking technology and identify at least 10 security and/or privacy risks the technology has
    8·1 answer
  • What does the launcher button do? (From Microsoft Word 2016)
    6·1 answer
  • What are the three common forms for mining structured and unstructured data?
    14·1 answer
  • Application software can run without the presence of system software true or false ​
    5·1 answer
  • GIVING OUT BRAINLIEST AND I AM ALSO WARNING EVERYONE TO NOT ANSWER A BUNCH OF rubbish just to get the points!
    7·2 answers
  • How does information promote cooperation and Industry please explain​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!