1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yan [13]
3 years ago
7

*asap* Name one of the similarities between Word and Excel.

Computers and Technology
1 answer:
Yakvenalex [24]3 years ago
7 0
The similarities are:  in both programs you can type letters, insert images, hyperlinks.
You might be interested in
An information system is the set of steps that needs to be followed to ensure that software development proceeds in an orderly f
tia_tia [17]

Answer:

True

Explanation:

It is TRUE that An Information System is the set of steps that need to be followed to ensure that software development proceeds in an orderly fashion.

This is evident in the fact that the Information system involves various stages and different elements such as data, people, procedures, hardware, and software.

All these elements form together to create several steps in software development in a suitable manner that meets the clients' and customers' needs.

4 0
3 years ago
Ideally, how often should you back up the data on your computer? once an hour once a day once a month once a year
AleksAgata [21]
It really depends on your type of data, if it's sensitive data or not. And it also depends on what type of backup (Incremental, Decremental, etc.). But you should aim to backup at least once a week, and also do a backup of your original backup.
6 0
3 years ago
Read 2 more answers
Explain 3 ways you can be an upstander when seeing cyberbullying.
Bess [88]

Answer:

Assuming an upstander is someone that opposes cyberbullying:

(1) Call them out

(2) Report the behavior to proper moderation authority

(3) Tell the person to block messages from the cyberbully

I don't really know what else you want from this.

Cheers.

3 0
3 years ago
Read 2 more answers
Where you should go to find out what access the system and users to a file ​
dsp73

Answer:

To see who reads the file, open “Windows Event Viewer”, and navigate to “Windows Logs” → “Security”. There is a “Filter Current Log” option in the right pane to find the relevant events. If anyone opens the file, event ID 4656 and 4663 will be logged.

4 0
3 years ago
What are the reason of making computer virus.​
GenaCL600 [577]

Answer:

Some computer experts create computer viruses to prove certain a process will work

Explanation:

6 0
2 years ago
Read 2 more answers
Other questions:
  • Mrs. Golden wanted to collect baseline data on how often Lauren speaks to her neighbors during silent reading. He divided the 15
    9·1 answer
  • What type of camera is a cell phone camera
    14·2 answers
  • A computer lab has two printers. Printer I handles 40% of all the jobs. Its printing time is Exponential with the mean of 2 minu
    8·1 answer
  • A program that contains the following method: public static void display(int arg1, double arg2, char arg3) { System.out.println(
    15·1 answer
  • Bytes are typically represented with a lowercase b and bits with an uppercase B.<br> true or false
    7·1 answer
  • Compared to a virtual image, a real image
    15·2 answers
  • Is there any quantum computer in India?​
    9·1 answer
  • You are required to copy in your attendees' emails from outside of Outlook when creating a meeting
    6·2 answers
  • In the last two decades, how have cameras evolved?
    12·2 answers
  • Define the term hardwar<br><br>​
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!