1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aev [14]
4 years ago
13

Which element of a business document provides additional information but is not a part of the body of the text?

Computers and Technology
2 answers:
vazorg [7]4 years ago
7 0

The answer is footer

The footer is a separate part of the document on the bottom of each page of a business document that contains name of the company, email address, phone numbers, or the website of the company. It is usually written in a smaller font and is used to expound something or reference some part of the agreement.  


Ierofanga [76]4 years ago
4 0
2. Footer This is the added info at the bottom of the document.
You might be interested in
What two tasks can be executed from the service console for Autonomous Databases? (Choose two.)
otez555 [7]

Answer:

A and D

Explanation:

  • Autonomous Databases monitoring for usage and query performance. and Wizard to download connection wallet for connection from desktop tools.
  • Each autonomous database example has its own service console to monitor that feature. The Overview and Activity tabs on the Service Console provide information about improved service performance.
  • The Activity tab displays detailed information about past and current monitored SQL statements and every detail.
  • You can also download Client Credentials (Wallet) from the Services console for your autonomous database, select Administration, and then Download Client Credentials (Wallet).
8 0
4 years ago
A client calls to complain that his computer starts up, but crashes when Windows starts to load. After a brief set of questions,
melomori [17]

Answer:

It may be that the amount of ram is not compatible with that computer, it may not support ram that is over 8 GB or higher, it may not be properly installed in the hardware, or the motherboard may not be able to read it.

Explanation:

Hardware and software is very unbalanced when it comes to new RAM being installed, as people complain about this exact same issue many times.

5 0
4 years ago
What tool is provided in Windows to facilitate sharing data objects between applications and computers?
Anton [14]

Answer:

Component services

Explanation:

In Windows, components services are integrated into the Administrative Tools and are used to configure certain COM (Component Object Model) components and applications. They are also used to ;

i. assign roles to users and groups.

ii. facilitate data sharing between applications and computers by processes such as pooling, pausing, resuming and recycling applications.

7 0
3 years ago
Why internet is helpful for ICT?​
insens350 [35]

Explanation:

Information & Communication Technology is an extended term for Information Technology. That stresses the role of unified communication & integration of telecommunications & computers as well as enterprise software, middleware, storage & audiovisual, that enables users to access, store, transmit & manipulate information. The term ICT is used to refer to the convergence of audio-visual & telephone networks with computer networks through single cabelling or link systems.

All the things that are happening nowadays are with the help of the Internet. From shopping, meetings, messaging, video conferencing, news and many more are happening just in single touch within a fraction of seconds you will know what's happening in the corner of the world, around the world, beyond the planet, you can communicate with anyone you want, you can purchase from where ever you want. This Internet has made this huge world like a small apple.

4 0
3 years ago
In computer science, what does the word security mean?
zepelin [54]

Answer:

B

Explanation:

Computer security, cybersecurity or information technology security (IT security) is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.[1]

4 0
3 years ago
Other questions:
  • Pls help me. ask yourself what would jesus do...
    14·1 answer
  • How to transfer photos from iphone to iphone?
    14·2 answers
  • What setting in Word keeps single lines of a new
    15·1 answer
  • How to find out if your Mac has been hacked
    12·1 answer
  • #Write a function called 'string_type' which accepts one #string argument and determines what type of string it is. # # - If the
    8·1 answer
  • What is the advertising photographer’s main objective in creating an image?
    11·1 answer
  • You load an image file into a numpy array and look at its shape, which is (433, 650). What does this indicate?
    13·1 answer
  • Go in my discord server Code is . (CebjBXN)​
    10·2 answers
  • Why should we learn Ethereum? Explain.
    8·1 answer
  • Help debugging line 7 type error more arguments (5) than expected (1)
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!