1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adoni [48]
3 years ago
9

Database management software allows you to create illustrations, diagrams, graphs, and charts that can be projected before a gro

up, printed out for quick reference, or transmitted to remote computers.
Computers and Technology
1 answer:
kaheart [24]3 years ago
5 0

Answer:

The above statement is FALSE

You might be interested in
What is the answer to in Microsoft Word you can access the blank from the command command from the mini toolbar what is the corr
fgiga [73]
<span>The correct answer is: Option (C) Underlined

Explanation:
In Microsoft Word (version 2007 and version 2010), the following commands you can use:
1. Bold
2. Highlight Text
3. Font Size
4. Italics
5. Underline
6. Format Painter
7. Increase indent of text
8. Decrease indent of text
9. Increase font size
10. Center text (alignment)

Word count, save as and insert citation commands do not exist in the mini-toolbar. Hence, the correct option is Option (C) Underlined</span>
4 0
3 years ago
Read 2 more answers
Where would you click to change the<br><br>Screen Saver?​
ycow [4]

Answer:

Explanation:

Go to Settings > Personalization > Lock screen, and select Screen saver settings. In the Screen Saver Settings window, choose a screen saver from the drop-down list.

8 0
3 years ago
Read 2 more answers
What is the highlighted portion of the screen called?
inna [77]

Answer:

/ˈerər/

Learn to pronounce

noun

a mistake.

"spelling errors"

Similar:

mistake

fallacy

misconception

delusion

inaccuracy

miscalculation

misreckoning

blunder

fault

flaw

oversight

misprint

literal

erratum

misinterpretation

misreading

slip-up

bloomer

boo-boo

6 0
4 years ago
Define binary number and decimal number with example​
photoshop1234 [79]

Answer:

The Decimal Number System is a number system for which every real number x can be written in terms of the ten digits 0, 1, 2, 3, 4, 5, 6, 7, 8, and 9 as the sum of powers of 10. A number in the decimal number system is said to be of base 10 and to specify this we attach a subscript 10 to x, written (x)10.

The Binary Number System is a number system for which every real number x can be written in terms of the two digits 0 and 1 as the sum of powers of 2. A number written in the binary number system is said to be of base 2, and to specify this we attach a subscript 2 to x, written (x)2.

4 0
3 years ago
Donna often travels around the world. When she travels, she needs to access her emails from different locations. However, to kee
Tju [1.3M]

Answer:

Yahoo! mail

Explanation:

In the context, Dona travels most often around the world. While traveling, she has to access her emails from different location and at different times. But in order to keep her luggage light, she never carries the laptop with her. Therefore, Donna uses Yahoo! mail to access her emails.

Donna uses Yahoo mail because she can install the Yahoo! mail app in her phone or tablets which is small in size and of light weight. She is able to organize her Outlooks,  Google mails and  Yahoo accounts. In Yahoo! mail, Donna is also able to sign in with her any of the non yahoo accounts and it also provides free cloud storage space.

8 0
3 years ago
Read 2 more answers
Other questions:
  • Select the correct answer.
    8·1 answer
  • In a 4-way 16-bit Multiplexor the selector is:________
    6·1 answer
  • 2 A_______<br> uses graphics or pictures to help the user navigate and<br> access programs
    14·1 answer
  • Technology has proliferated in Kenya and Somaliland, with text messages used to replace cash, creating mobile money use that, on
    11·1 answer
  • 19. Fair use applies to which of the following situations?
    14·1 answer
  • What directs the read/write arm of the hard drive to where data exists and accesses it upon the user's request?
    8·1 answer
  • The Bellman-Ford algorithm for the shortest path problem with negative edge weights will report that there exists a negative cyc
    13·1 answer
  • 4. Each mobile device described in this chapter requires that the user have a/an ____________________ associated with services o
    5·1 answer
  • 10. Site-to-Site VPN architecture is also known as
    6·1 answer
  • attackers typically use ack scans to get past a firewall or other filtering device. how does the process of an ack scan work to
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!