1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SVETLANKA909090 [29]
3 years ago
14

5. The shell of a document that may be used over and over in desktop publishing is called a

Computers and Technology
2 answers:
Blababa [14]3 years ago
6 0
The answer is B) Template. 

Various templates are available in most all desktop publishing programs, from resume templates in Word to Income Statement templates in Excel. Templates are useful for skipping the general "setup" process of making a document, and allow you to focus more on filling the document with the relevant data and polishing it to your specific needs once most of the legwork is done. 
kolezko [41]3 years ago
3 0
<span>5. The shell of a document that may be used over and over in desktop publishing is called a 

Answer: template</span>
You might be interested in
The concept of "plug and play" is demonstrated by which of the following<br> scenarios?
bagirrra123 [75]

Answer:

Farah has completed a post-secondary education program and is now ready to begin working, without additional training, on her first day .

Explanation:  HoPe ThIs HeLpS

6 0
3 years ago
The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals
valkas [14]
Data compilation I believe
4 0
3 years ago
Is iPhone better than android
andriy [413]

Answer:

It's up to personal preference.

Explanation:

iPhone/Apple gives more compliments to security than Android.

Android has more friendly user GUI and dev tools.

4 0
3 years ago
Read 2 more answers
Travis sends Suri what purports to be a link to an e-birthday card, but when she clicks on the link, software is downloaded to h
12345 [234]

Answer:

Identity Theft

Explanation:

Identity theft is the act of someone who obtains details about someone else illegally.  This is done to find personal and financial information such  name, address,social security number, passwords, and credit card number, phone number, e-mail, etc. Then the hacker can use this information to control bank accounts, e-mails, computers, portray himself as you are, or sell information to someone else.

3 0
3 years ago
Which range of values would result in 10 elements stored in an array?
Paraphin [41]

Answer:

0-9

Explanation:

count 0 as 1

len(0,1,2,3,4,5,6,7,8,9)=10

3 0
3 years ago
Other questions:
  • Tim has an old server computer that his company uses as a backup. One of the hard drives has gone bad and needs to be replaced.
    13·1 answer
  • Suppose the information content of a packet is the bit pattern 1110 0110 1001 1101 and an even parity scheme is being used. What
    15·1 answer
  • Unit 3 Computer Programming Study Guide
    6·1 answer
  • What statement best decribes the relashionship bewteen science and technoligy?
    11·2 answers
  • Identify at least five different Information Technology careers that you could pursue in your home state, and choose the three t
    10·2 answers
  • Why does everyone refer to dogs as being loyal
    11·2 answers
  • What is the code name for the 12 engineers who developed the ibm pc?
    8·1 answer
  • Design a class named Person and its two subclasses named Student and Employee. Make Faculty and Staff subclasses of Employee. A
    13·1 answer
  • HELP !!! Prompt <br> What is formatting text?
    7·2 answers
  • Y'+2y = 5-e^(-4x), y(0)=-11
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!