1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vlad [161]
3 years ago
7

The process of using a computer to write, design, and assemble documents is called A. desktop publishing. B. scanning. C. consul

ting. D. optical storage.

Computers and Technology
1 answer:
True [87]3 years ago
5 0
<span>The process of using a computer to write, design, and assemble documents is called?

Answer:</span><span>A. desktop publishing</span>

You might be interested in
State the difference between a file and a folder
Delicious77 [7]

Answer: A file is the common storage unit in a computer, and all programs and data are "written" into a file and "read" from a file. A folder holds one or more files, and a folder can be empty until it is filled. A folder can also contain other folders, and there can be many levels of folders within folders.

Explanation:

4 0
3 years ago
Which logging category does not appear in event viewer by default?
Ulleksa [173]

I believe this should have some multiple choice options: Application, System, Volume, Security.


The correct answer is volume.

7 0
3 years ago
Why were low quality video so often use when Internet connection we’re poorer than they are today
kakasveta [241]
What do you mean? I’m confused with the question, it doesn’t make sense:)
8 0
3 years ago
lance has three tables in his database. He wants to generate a report to show data from the three tables. Therefore, he decides
Masja [62]

Two of the three tables in his database should have foreign keys that link to primary keys in one of the other tables. That way he can join the tables together.

7 0
3 years ago
Read 2 more answers
What is the output of this line of code?
zzz [600]
The first one
“hello” + “goodbye”
6 0
3 years ago
Read 2 more answers
Other questions:
  • 38. Which of the following best describes why e-mail spoofing is easily executed? a. SMTP lacks an adequate authentication mecha
    15·1 answer
  • What language to learn to contribute to open source?
    11·1 answer
  • Which of the following is NOT a benefit of making digital information and scientific databases openly available across the inter
    12·1 answer
  • ______ is the primary and dominant cryptographic authentication and encryption framework for security development within the TCP
    12·2 answers
  • Steve adds a second 1-GB 240-pin DIMM to his PC, which should bring the total RAM in the system up to 2GB. The PC has an Intel C
    9·1 answer
  • token is 64 bytes long (the 10-Mbps Ethernet minimum packet size), what is the average wait to receive the token on an idle netw
    6·1 answer
  • Your company has been using Windows workgroups on a server running Windows Server 2016. Due to the rapid growth of the company,
    9·1 answer
  • Name the written test a potential driver must pass and list the minimum required score to earn a learner’s license.
    8·2 answers
  • You receive an email from a woman claiming her father was poisoned by business associates, but before his passing placed 12 mill
    12·2 answers
  • 4. Cash inflows from investing activities normally arise from all of the following EXCEPT
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!