1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
JulijaS [17]
3 years ago
9

By default, a word document generally displays in ____ view.

Computers and Technology
1 answer:
Sladkaya [172]3 years ago
4 0
<span>By default, a word document generally displays in Print Layout view.
</span>The Print Layout view is on of the several viewing options (<span>Read Mode, </span>Print Layout<span>, or Web </span>Layout)  that change how your document is displayed.
The Print Layout view is useful if you're planning to print<span> the document, that is the reason why it is called Print Layout. </span>
You might be interested in
An HP PC does not support the HP System Board Configuration tool, and you must use the HP System Board Replacement and System Di
GuDViN [60]

Answer:

Press F2 to see if the System Diagnostics or Hardware Diagnostics UEFI menu displays.

Explanation:

Start the HP BIOS Setup utility and view the Advanced > Diagnostics screen for supported diagnostics.

Boot to Windows and launch HPSA. Search for HP PC Hardware Diagnostics UEFI.

All HP commercial products manufactured after 2009 have HP PC Hardware Diagnostics UEFI installed on the hard drive.

7 0
3 years ago
You work as a Network Administrator for wwwpany Inc. You have suspected a bad driver or perhaps malware. Which of the following
vichka [17]

Answer:

Explanation:

There is a solution called ETA (Encrypted Traffic Analytics) this is a security advanced network that helps us to identify malware between the encrypted data, but with this tool is no necessary to break any protection and privacy chain.

This technology use machine learning to read all the traffic without deciphering it, in this way we can detect a difference between reliable and malicious traffic.

En windows we can use Microsoft Security Essentials like antivirus and detect virus, we can use Process Explorer, analyze the traffic, we can use Microsoft Network Monitor.

8 0
3 years ago
In a computer instant messaging​ survey, respondents were asked to choose the most fun way to​ flirt, and it found that ​P(D)equ
MA_775_DIABLO [31]

Answer:

P(D) = 0.4

Explanation:

P(D) is the probability of randomly selecting someone.

who does not choose a direct​ in-person encounter as the most fun way to flirt.

1 – 0.600 = 0.4

P(D) = 0.4

hence the upper D over bar right parenthesis represent and its value is 0.4

8 0
3 years ago
How does speech recognition software know what you are saying?
boyakko [2]
It converts the mic input into a string of raw data, then compares it to hundreds, even thousands of voice samples. The output is a polished string of data in words.
8 0
3 years ago
Phases of systems development life cycle do developers identify the particular features nd functions of a new system
ki77a [65]

The phase where developers identify the particular features and functions of a new system is the requirement and analysis stage.

<h3>What is system development?</h3>

System development is the process of defining, designing, testing, and implementing a new software application or program.

System development has a life cycle. The primary stages are as follows;

  • Planning stage
  • Requirement and Analysis
  • Design
  • Development
  • Testing
  • Implementation.
  • Operation and maintenance.

Therefore, the phase where developers identify the particular features and functions of a new system is the requirement and analysis stage.

learn more on system development here: brainly.com/question/13042526

#SPJ12

7 0
1 year ago
Read 2 more answers
Other questions:
  • An authenticated user can add up to how many computer accounts to the domain, by default
    6·1 answer
  • Greg works for an online games development company. He is not a net freak, but occasionally he visits online literature sites an
    7·1 answer
  • Suppose you have a 16-bit machine with a page size of 16B. Assume that any unsigned 16-bit integer can be a memory address. Also
    9·1 answer
  • You modify a document that is saved on your computer. Where are the changes stored until you save the document?a. Radom access m
    15·1 answer
  • Which statement reflects an opinion about technology? Select all that apply. Select one or more: a. It is easy to imagine that a
    5·1 answer
  • The Rule of Thirds is a way to:
    14·1 answer
  • One of the most common uses of spreadsheet are
    12·1 answer
  • .<br>1.<br>CPU<br>f. ALU<br>. CU<br>h. CRT<br>g. LED<br>​
    15·1 answer
  • Why are default parameters useful? *This is JavaScript*
    7·1 answer
  • GIVING OUT BRAINLIEST AND I AM ALSO WARNING EVERYONE TO NOT ANSWER A BUNCH OF rubbish just to get the points!
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!