1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tomtit [17]
2 years ago
8

1.Microsoft Word is a/an ........​

Computers and Technology
2 answers:
PSYCHO15rus [73]2 years ago
6 0

Answer:

It is a word processing software

Explanation:

Hope this helps

Finger [1]2 years ago
3 0

Answer:

company I believe

Explanation:

I believe

You might be interested in
In PKI, the CA periodically distributes a(n) _________ to all users that identifies all revoked certificates.
Trava [24]

Answer:

" CRL (certificate revocation list)" is the appropriate answer.

Explanation:

  • A collection of such subscriber bases containing accreditation or certification status combined with the validation, revocation, or outdated certification within each final customer is known as CRL.
  • Only certain subscribing workstations with a certain underlying cause authentication system should have been duplicated.
4 0
3 years ago
Help me<br>please answers this questions<br>​
kobusy [5.1K]

Answer:

RSI stands for repeating similar movements

3 0
2 years ago
Fill in the blank: In a Word chart, text that describes the data represented in a chart and that is typically displayed on the r
Triss [41]

Answer:

Data bar

Explanation:

8 0
3 years ago
In order to be compliant with the NIST publications, policies must include key security control requirements. One of these key r
rodikova [14]

Answer:

The answer is "Option A".

Explanation:

A comprehensive collection of principles, guidelines, proposals, and studies on information and information systems privacy and safety are produced and carried out in the NIST publications.

  • The FIPS management standards for federal information and security laws contain various technical reporting sequences.
  • This process takes place after a plan is identified, reviews are carried out and risk analysis is performed.
8 0
3 years ago
What are some other projects or things you do in your life (other than writing an essay) where you use an iterative process?
Sophie [7]

Answer:The iterative design process occurs in a continuous cycle involving three unique stages: formulate, test, evaluate. These core elements make up the basic progression in which the development of a game will follow. The rest is simply rinse and repeat

Explanation:

7 0
2 years ago
Read 2 more answers
Other questions:
  • An IT department submits a purchase order to buy a new computer from a vendor. "Purchase orders" are documents issued by buyers
    12·1 answer
  • Question 1 (True/False Worth 15 points)
    6·1 answer
  • Which of the following are typically an example of primary resources?
    13·1 answer
  • To generate a report with exact results based on specific criteria it is best to base the report on a(n) ____________________ cr
    6·1 answer
  • Trudy is preparing a reply to an email message. Before she could send out the message, she is called for a meeting. If Trudy has
    6·2 answers
  • Categorize each of the following situations as a compile-time error, run-time error, or logical error. Group of answer choices m
    5·1 answer
  • 13) When developing film, how do you dispose of fixer as opposed to developer?
    10·1 answer
  • What are the main dimensions of information system and their components
    13·1 answer
  • Write a python program to calculate the length of any string recursively​
    6·1 answer
  • HELPPPPP 20 POINTS CORRECT ANSWER GETS BRAINLIEST<br>sorry wrong amount of points ;-;
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!