1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yan [13]
3 years ago
7

*asap* Name one of the similarities between Word and Excel.

Computers and Technology
1 answer:
Yakvenalex [24]3 years ago
7 0
The similarities are:  in both programs you can type letters, insert images, hyperlinks.
You might be interested in
Which diagram is NOT a good model of 3÷14?
swat32
I need a pic for this
7 0
3 years ago
Read 2 more answers
Please name the OOP term that allows children classes to have methods with the same names as methods in their parents.
RSB [31]

Answer:

Inheritance

Explanation:

3 0
3 years ago
What are some ways in which reading and writing have changed in our newly networked world
olga_2 [115]
Reading and writing have given us both a way to pass on knowledge and learn things we cant learn first hand.<span />
3 0
3 years ago
Once jaden has decided upon the telecommunications technology his team will use, he will have completed the last step of the dec
mrs_skeptik [129]
<span>Once Jaden has decided upon the telecommunications technology his team will use, he will have completed the last step of the decision-making process. TRUE.</span>
6 0
4 years ago
Which of the following refers to eavesdroppers driving by buildings or parking outside and trying to intercept wireless network
kifflom [539]

Answer:

Correct answer is War Driving

Explanation:

War driving is very similar to war dialing which was used to breach telephone network

War driving is also known is access point mapping.Its a process in which a person look for wireless networks and tries to find vulnerabilities in them to exploit while driving in a vehicle. A computer , Ethernet card and antenna is needed to do war driving.

To protect against this threat WEP (Wired Equivalent Privacy) encryption,

dmz,firewalls and WPA are used.

5 0
3 years ago
Other questions:
  • the task is to ask the user for three numbers and find the average which pseudocode gives you the comment outline for task​
    10·1 answer
  • 10 facts about turbines
    11·2 answers
  • Jackson is teaching a class the concept of the binary number system. Which term will he use to refer to the leftmost bit of a bi
    7·1 answer
  • What can be designed to create annoying glitches or destroy data
    11·1 answer
  • When using linear or reciprocal navigation, what should be the interface include?
    15·1 answer
  • Join zoom meet <br>id=547 458 9345<br>pw=sencHURI​
    8·2 answers
  • 1.What is a keyboard layout.
    5·1 answer
  • If your pulse is higher than your Target Heart Rate during exercise, what should you do?
    5·2 answers
  • If any one answered this i will give brilientst what is stimulation program​
    6·1 answer
  • failed logins or instances of denial of access to restricted files may be indicators of compromise. suggest where records of suc
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!