1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oliga [24]
3 years ago
13

Word 2013 opens, by default, on a blank document?

Computers and Technology
2 answers:
Lina20 [59]3 years ago
6 0
Word 2013 opens on a blank document by default
Mariana [72]3 years ago
3 0
Word 2013 opens on a blank document anyway
You might be interested in
Page break preview identifies manual page breaks with a dotted blue line and automatic page breaks with a solid blue line.
Mashutka [201]
Page break preview identifies manual page breaks with a dotted blue line and automatic page breaks with a solid blue line.

a. True
7 0
3 years ago
Explain the following as used in Tally Accounting Software:
vaieri [72.5K]
Business transactions
3 0
3 years ago
Can someone help me with Edhesive 8.3 lesson practice question number 5? I can’t figure it out
Galina-37 [17]

Answer:

3

Explanation:

4 0
3 years ago
The answer for 1 and 2
Mrrafil [7]
1. A.  It is basically the definition of a political cartoon.
2. D. They used newspaper, protesting, and marches.
<span />
6 0
4 years ago
In the context of computer crimes, those who attempt to destroy the infrastructure components of governments and financial insti
elixir [45]

In the context of computer crimes, those who attempt to destroy the infrastructure components of governments and financial institutions are known as <u>d. cyber terrorists</u>.

<u>Explanation</u>:

Cyber crime means crime committed with the help of computer and internet. Cyber terrorism means crime that causes damage to infrastructure components of financial institutions and government office and causes threat to the society.

Cyber terrorists are person who involve in cyber terrorism. The systems used in the governments and financial institutions should be protected with hardware and software to avoid cyber terrorism.

This kind of cyber terrorism is very dangerous, as they hack the system and destroy the valuable information stored in it.

5 0
3 years ago
Other questions:
  • What aspect do you need to keep in mind when you add images in a word document?
    11·2 answers
  • Which is the correct sequence of steps for opening a new document?
    10·2 answers
  • Recovery after a disaster involves installing the most recent ________ backup copy.
    15·1 answer
  • HELP I WILL MARK BRAINLIEST!!! I NEED ASAP!!!
    5·1 answer
  • Design the logic for a program that allows a user to enter 20 numbers, then displays each number and its difference from the num
    13·1 answer
  • How to make a water bottle rocket??
    6·1 answer
  • . When would one use the analytic application fraud detection?
    12·1 answer
  • How many of these imformation have you shared​
    14·1 answer
  • PLZZZ HELP MEE i need it done today
    7·1 answer
  • Explain the differences between copyright, fair use, and trademark?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!