1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikitadnepr [17]
3 years ago
10

You should use _____ software for writing a letter.

Computers and Technology
1 answer:
Amanda [17]3 years ago
6 0
You should use word processor software for writing a letter

reason :
word processor is a software to make a letter. it has many functions. not only for make a letter. word processor is made for make a document in a computer

program examples :
- Microsoft Word
- Wordpad
You might be interested in
Suppose an ArrayList list contains {"red", "red", "green"}. What is the list after the following code? String element = "red"; f
maksim [4K]

Answer:

The output of the given code as follows:

<u>Output: </u>

{"red", "green"}

Explanation:

  • In the given code a list is defined, which contains three elements, which are "red, red, and green". In the next step, a string variable "element" is initialized with a value that is "red".
  • Then a for loop is declared, that counts list size, and inside the loop and if block is declared, that compares the value list with element variable then it removes from the list.  

8 0
3 years ago
Select the correct answer.
aleksandrvk [35]

Answer:

B.  color and painting tools

Explanation:

5 0
2 years ago
What is not an example of ai
BARSIC [14]

Answer:

human

Explanation:

because it is not a machine

8 0
3 years ago
Read 2 more answers
What occurs when a company knows enough about a customer's likes and dislikes that it can fashion offers more likely to appeal t
Norma-Jean [14]

Answer:

Personalization

Explanation:

Recommendation systems are becoming a powerful tool in our times today, from only shopping to healthcare provision. One major aspect of Recommender systems is Personalization.

Personalization is a concept of adjusting a service or product to greatly suit the customer. Personalization can be drawn by the information provided by the individual such as location, gender, marital status, etc. or drawn from other inferences retrieved from the customer, such as:

  1. the most clicked service category of a customer,
  2. customer browsing patterns or
  3. services or products previously obtained by a customer.

These inferences retrieved from customers can greatly improve customer satisfaction and get them drawn to the system.

5 0
4 years ago
What isthe concept of packets, give example?
Oduvanchick [21]

Answer: Packets are the small unit of data that is sent from source to destination on a network.

Explanation: Packets are small packages that carry data in a packet form and is used from transferring it on internet or any kind of packet-switched network. They use the internet protocol (IP) for the transmission of data.

Example: packet radio is a sort of digital radio that uses the packet for transmission of data to other nodes by utilizing the AX-25 protocol.

6 0
3 years ago
Other questions:
  • References are usally innocuous because they are the least personal and direct of the four reference types
    5·1 answer
  • The control programs managing computer hardware and software perform the _________ function to control and prioritize tasks perf
    8·1 answer
  • ______was developed as an interim management protocol with OSI as the ultimate network management protocol.
    5·1 answer
  • Which of the following is a central feature of agroup?interactionmutual influenceinterdependenceall of the given options
    10·1 answer
  • What does the term hardware refer to?
    13·1 answer
  • What is the multiple source test
    15·1 answer
  • Now suppose there are four links between source and destination (three routers in the path between source and destination). Each
    8·1 answer
  • A __________ search engine focuses on a specific subject.<br><br>answer : Specialized
    8·1 answer
  • You have purchased a used computer from a computer liquidator. When you boot the computer, you find that there has been a passwo
    11·1 answer
  • Which step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs? maintain access gain a
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!