1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yan [13]
3 years ago
7

*asap* Name one of the similarities between Word and Excel.

Computers and Technology
1 answer:
Yakvenalex [24]3 years ago
7 0
The similarities are:  in both programs you can type letters, insert images, hyperlinks.
You might be interested in
The Apple II is an IBM-compatible PC "clone.
lutik1710 [3]
Is this supposed to be a true or false question?
4 0
3 years ago
A programming error that causes a program to generate incorrect results due to failing to use the proper combination of statemen
tino4ka555 [31]

Answer:

Logic error.

Explanation:

Logic error is that type of error in the programming language in which the outcome of the program is incorrect due to the fault on implementing the logic in the program by the programmer, it gives output but that output is incorrect.

<u>For example</u>:

If the programmer wants to create the program of the greater than and he implements wrongly '>' to '<' then the following program returns output but that output is incorrect.

7 0
4 years ago
WILL GIVE BRAINLIEST ANSWER!!!<br><br> How do you manage your screen time?
Aloiza [94]
You can set it up in settings and set strict hours for screen time.
7 0
3 years ago
Read 2 more answers
Different between client server architecture and peer to peer architecture​
Vilka [71]

Answer:

In Client-Server Network, Centralized server is used to store the data.

8 0
3 years ago
Casting is one of the oldest known manufacturing processes. <br> True or false
alexandr1967 [171]
I think the answer is true because casting has been found 6000 years ago!
7 0
3 years ago
Read 2 more answers
Other questions:
  • Most input/output devices communicate with components inside the computer case through a wireless connection or through cables a
    8·1 answer
  • Identify characteristics of top-down programming design. Choose all that apply.
    13·1 answer
  • In a microsoft word document, what is the amount of space that appears between paragraphs called?
    14·1 answer
  • Conduct online research on web authentication and define what it is. Describe different authentication methods
    5·1 answer
  • Double[][] vals =
    8·1 answer
  • Which Call of Duty game is the best?
    6·1 answer
  • Why do we say that IP provides ""best-effort"" service?
    11·1 answer
  • Scanning low allows you to locate __________ before you hit them
    13·1 answer
  • What is the full form of 'Rom<br>​
    7·2 answers
  • A penetration tester is experimenting with Network Mapper (Nmap) on a test network as a privileged user. The tester would like t
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!