1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
igor_vitrenko [27]
3 years ago
10

Template files can contain the following items: text, tables, images and lists.

Computers and Technology
1 answer:
TEA [102]3 years ago
4 0

It is true that template files can contain items such as text, tables, images and lists

Explanation:

A template is a pre-designed document file that is formatted within a default layout and is used to help users create new documents such as letters, tables, resumes, presentations, and reports. A resume template, for instance, already contains placeholder text that users can use to replace text information of their own. It would most likely have a blank space for details like your name, address, and contact information. Some programs have templates that are pre-built while others can be created from scratch. Microsoft PowerPoint has design templates that contain visual representation of images as well. These images help achieve document cohesion.

Learn more about templates

brainly.com/question/3137525

#LearnWithBrainly

You might be interested in
what program searches the Internet for specified keywords and returns a list of the pages where the keywords were found
slava [35]

Metasearch engine. hope this helps


4 0
4 years ago
जिल्ला । स्तरीय = 'जिल्ला स्तरीय' भए जस्तै तलका शब्दमा स्तरीय जोडेर
Gekata [30.6K]

Answer:

Well, I guess you could use a special representation of the function through a sum of terms, also known as Taylor Series.

It is, basically, what happens in your pocket calculator when you evaluate, for example,  

sin

(

30

°

)

.

Your calculator does this:

sin

(

θ

)

=

θ

−

θ

3

3

!

+

θ

5

5

!

−

...

where  

θ

must be in RADIANS.

In theory you should add infinite terms but, depending upon the accuracy required, you can normally stop at three terms.

In our case we have:  

θ

=

π

6

=

3.14

6

=

0.523

and:

sin

(

π

6

)

=

sin

(

0.523

)

=

0.523

−

0.024

+

3.26

⋅

10

−

4

−

...

=

0.499

≈

0.5

Explanation:

3 0
4 years ago
Which of the following should be clicked to open Backstage View?
lora16 [44]

Answer:

File tab

Explanation:

source https://www.computerhope.com/jargon/b/backstage-view.htm

7 0
3 years ago
Read 2 more answers
If an image has only 4 colors, how many bits are necessary to represent one pixel’s color? Describe a new custom encoding that u
MakcuM [25]

Answer:

1) 2 bits 2) shown in explanation 3) shown in explanation 4) 22 bits per pixel (2.75 bytes)

Explanation:

As a bit is one of two states, 1 or 0, 2 bits is sufficient to represent 4 colors:

00 = color 1

01 = color 2,

10 = color 3,

11 = color 4

This would be the custom type of encoding for that specific image as it only uses 4 colors.

Now to calculate the amount of memory saved, which is quite simple:

24-2=22

So you Would save 22 bits per pixel or 2.75 bytes per pixel.

5 0
3 years ago
An attacker obtains a connection to your LAN and then uses SETH to perform a MiTM attack between your system and the company RDP
maxonik [38]

The type of attack which has occurred in this scenario is known as credential harvesting.

<h3>What is credential harvesting?</h3>

Credential harvesting is also known as account harvesting and it can be defined as a type of attack that involves the use of the following techniques to illegally obtain large numbers of user credentials (username or password):

  • MITM attacks
  • DNS poisoning
  • Phishing

In conclusion, the type of attack which was used in this scenario is known as credential harvesting.

Read more on phishing here: brainly.com/question/23850673

#SPJ1

3 0
2 years ago
Other questions:
  • Anna is looking for a job. Which two types of skills would she find necessary to secure a job?
    10·1 answer
  • Acrynom for wys or wyg
    10·1 answer
  • Write qbasic code for given pattern<br><br>NEPAL<br>. EPA<br>. P​
    12·1 answer
  • What is used to determine when the communications channels are clear and when a device is free to transmit data
    6·1 answer
  • If you attempt an edgeunity quiz is your latest attempt the one counted?
    10·1 answer
  • Write a Java program that prompts the user for an int n. You can assume that 1 ≤ n ≤ 9. Your program should use embedded for loo
    5·1 answer
  • What is the point of brainy when other people have to answer your questions but not the cumputer
    9·1 answer
  • Create the HTML code for this
    14·1 answer
  • In the software development process, which review studies the software design before it is released for coding?
    7·1 answer
  • Name four successful conversions to an electronic health record system in a medical facility
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!