1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Law Incorporation [45]
3 years ago
8

What to do when microsoft word is eating your words?

Computers and Technology
1 answer:
Aloiza [94]3 years ago
4 0
Update it so it wont do that
You might be interested in
Match each example to the type of component, either Input, Process, or Output.
statuscvo [17]

Answer:

Find answers below.

Explanation:

1. Input: it takes in data in its raw format or an item that receives data and transfers them to the process.

  • <em>Employees in a management team. </em>
  • <em>Program code for a software application. </em>
  • <em>Flour for making bread.</em>
  • <em>A wrench. </em>

2. Process: it converts the data from an input to a usable format. Also, it conveys the processed data (informations) to the output.

  • <em>Fermentation. </em>
  • <em>Harvesting a crop. </em>
  • <em>Dryer spinning at top speed.</em>

3. Output: it is the result produced by a process i.e the finished product.

  • <em>Newly painted structure. </em>
  • <em>Freshly mowed lawn. </em>
  • <em>Hot muffins. </em>
5 0
3 years ago
Which of the following Google tools support collaboration? Docs Sheets Slides All of the Above
azamat

Which of the following Google tools support collaboration?

1. Docs

2. Sheets

3. Slides

4. All of the Above


Ans. <u>4. All of the Above</u>

5 0
3 years ago
Data as a service began with the notion that data quality could happen in a centralized place, cleansing and enriching data and
saul85 [17]

Answer: True

Explanation:

 Yes, the given statement is true that the data as the service model basically describe about the data quality which could be happened in the centralized place and also enriching the given data. It also offer the data services to the different types of users, system and applications.

 The data as a service (DaaS) is similar to the software as s service. The DaaS concept is that it is provided according to the requirement of the user such as data and information of the different types of product and services.

 It is technically known as the web delivering service which is offer by the cloud manager and its also perform various types of function.  

7 0
3 years ago
what component of virtualization controls all physical memory, and thus has the ability to make any unused memory pages in each
svlad2 [7]

Since the hypervisor, a component of virtualization, is in charge of managing all physical memory, it can make any memory pages left over in each guest virtual machine available to other virtual machines or the host computer.

<h3>What Exactly Is A Hypervisor?</h3>

A hypervisor is a class of computer software, firmware, or hardware that builds and manages virtual machines (also known as a virtual machine monitor, VMM, or virtualizer). A host machine is a computer on which a hypervisor is running one or more virtual machines, and a guest machine is a specific virtual machine. The hypervisor controls how the guest operating systems are executed and provides them with a virtual operating environment. The visitor often uses the native hardware to carry out instructions, unlike an emulator. The virtualized hardware resources may be shared by several instances of various operating systems. For instance, Linux, Windows, and macOS instances can all operate on a single real x86 computer. Contrastingly, with operating-system-level virtualization, each instance (often referred to as a container) only needs to share a single kernel, while the guest operating systems—such as various Linux distributions using the same kernel—can differ in user space.

To know more about Softwares, visit:

brainly.com/question/1022352

#SPJ4

6 0
1 year ago
Why is the computer uses binary why not trinary?​
Ray Of Light [21]

Explanation:

because they only function with that one the gates also prevent it from being able to use it

3 0
2 years ago
Other questions:
  • Wich of these is an example of magnetic storage
    11·1 answer
  • Cryptolocker is an example of what type of malware?
    11·1 answer
  • Which network type connects each computer and device to a central device?
    5·1 answer
  • Indicate the proper order (1-4) of the following PR strategic planning 4-step process. 1 Defining the problem 2 Evaluating the p
    10·1 answer
  • ) How many switching functions of two variables (x and y) are there?
    11·1 answer
  • URLs are directions that browsers follow in order to find specific web page files. What is the first part of the URL that is the
    14·1 answer
  • Multiple client switches and routers have been set up at a small military base. The network team decided to implement Terminal A
    15·1 answer
  • Prepare a risk assessment report (RAR) with information on the threats, vulnerabilities, likelihood of exploitation of security
    14·1 answer
  • 14. Which of the following statements is true? A. The most secure email message authenticity and confidentiality isprovided by s
    11·1 answer
  • Choose the tag required for each stated goal.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!