1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kakasveta [241]
3 years ago
7

Which business filing process puts documents or data in the order by date? a. Linear

Computers and Technology
1 answer:
ivanzaharov [21]3 years ago
3 0

Answer:

d. Chronological

Explanation:

Chronological can be defined as an arrangement of data, items or documents in the order in which they occurred or happened (in time), from the earliest to the most recent or latest.

Hence, chronological order is a business filing process which puts documents or data in the order by date.

<em>For instance, the arrangement of documents in a shelf from January to December. </em>

You might be interested in
Which of the following boxes should replace question mark
Rus_ich [418]

Answer:

There is nothing please put it then i will edit this answer.

Explanation:

6 0
3 years ago
The indent buttons on the home tab allow you to increase or decrease paragraph indenting in increments of ____ inches.
TEA [102]
<span>0.5 inches.
You may also manually set the indentation. In order to do this, click the "Page Layout" tab and enter the desired values in the boxes under "Indent". The indentation of a text is the distance it has from the left margin (when writing from left to right).</span>
3 0
3 years ago
What is a common indicator of a phishing attempt cyber awareness 2022
vivado [14]

There are several types of malicious document. A common indicator of a phishing attempt cyber awareness 2022 is that It includes a threat of dire circumstances.

  • Phishing attacks often makes use of email or malicious websites to infect the machine with malware and viruses so as to collect personal and financial information.

Cybercriminals often uses different means to lure users to click on a link or open an attachment that infects their computers thereby producing vulnerabilities for criminals to use to attack.

Learn more from

brainly.com/question/24069038

7 0
3 years ago
What is a graphical representation of a real person in a virtual community called?
Hitman42 [59]
A graphical representation of a real person in a virtual community is an avatar.
8 0
3 years ago
I can talk to you! How about we talk through the you know where people comment and say stuff about the question1
pychu [463]
Hmmm what do you want to talk about??
3 0
3 years ago
Read 2 more answers
Other questions:
  • A student is searching through a large box of unused cables and connectors in the classroom. The student finds a ribbon with con
    14·1 answer
  • Sally is editing her science report about living things. She needs to copy a paragraph from her original report.
    15·2 answers
  • How can rows be added to a table? Check all that apply
    13·2 answers
  • Who designed analatic engine in the 1930's?​
    10·1 answer
  • List the seven basic internal components found in a computer tower
    6·2 answers
  • Convert the following denary numbers into
    14·1 answer
  • Write short cut of<br> fully justified​
    7·1 answer
  • Please help me with this
    6·1 answer
  • Dana is moving to a new house. She has 15 boxes for books. Each box can hold up to 22 books. Dana has 375 books. How many more b
    10·2 answers
  • Excel creates which type of cell references in formulas by default?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!