1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
murzikaleks [220]
3 years ago
10

You can add envelopes to existing documents. a. True b. False

Computers and Technology
1 answer:
Lemur [1.5K]3 years ago
3 0
<span>The answer is true. Once documents are created, they may be accessed again and have envelopes pointing to them even when the documents are empty.</span>
You might be interested in
Your program has a two-dimensional array, scores. You are implementing your array with lists. Each member in the array is a pair
Viefleur [7K]

Answer:

scores.append(6,2)

Explanation:

This is a complicated question because in theory, scores.insert can also add values, but I am sure that the only line of code that would work is scores.append(6,2)

7 0
3 years ago
Minerals that contain the elements silicon and oxygen are called ______.
mojhsa [17]
Silcates are minerals with silicon bonded with oxygen.
7 0
3 years ago
How to get administrator privileges on windows 7?
Phoenix [80]
If you are on the admin account, you will already have them, but if you are on a different account, it's pretty impossible But you can get through by using command prompt.
4 0
3 years ago
The process of _____ determines what volume a system can handle by comparing its performance to standards in the industry.
Artyom0805 [142]

Answer:

benchmarking

Explanation:

7 0
3 years ago
Choose the expression that belongs in the blank in order to ask the user the question shown.
Rudik [331]

Answer:

"Juan"

Explanation:

If this is script, than that should be the correct argument.

6 0
2 years ago
Other questions:
  • A compound document contains _______ from different applications.
    12·2 answers
  • Explain how the principles underlying agile methods lead to accelerated development and deployment of software.
    6·1 answer
  • Brute force attacks involve identifying a valid user account and then bombarding the server with an extensive:
    13·1 answer
  • Which of the following is not part of active listening?
    6·2 answers
  • Belvedere Street is parallel to St. Anthony Street. Davidson Street is perpendicular to River Street. River Street is parallel t
    11·1 answer
  • If given the chance to own manage a business,what will be the name of the business?
    11·2 answers
  • An overall indication of the dependability of data may be obtained by examining the ________, credibility, reputation, and _____
    15·2 answers
  • Your task is to implement a function replace_once(t, d), that takes a text t and a replacement dictionary d, and returns the res
    10·1 answer
  • How would you describe binary to someone ??<br> PLEASE ANSWER I WILL GIVE U BRAINLY!!
    15·2 answers
  • How to realize dynamic balance of planar closed-chain leg mechanism?​
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!