1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inessa05 [86]
3 years ago
10

Sam's manager would like him to create and distribute copies of a budget report for each department. The budget report should sh

ow how much each department has spent on business travel, new software, and team breakfasts. Sam should use _____.
a word processor and fax machine
a spreadsheet and a scanner
a spreadsheet and a printer
presentation software and a projector



HURRY PLEASE
Computers and Technology
2 answers:
almond37 [142]3 years ago
7 0
<span>a spreadsheet and a printer</span>
Reika [66]3 years ago
6 0
Sam should use "a spreadsheet and a printer"
You might be interested in
Array unsortedArr contains an unsorted list of integers.
Ainat [17]

Answer:

a. Ill only

Explanation:

This is because, for option III, in inserting an element, one only need the array key for the position in which to insert the element and this is irrespective of whether the array is sorted or not.

Whereas, options I and II are easier done in a sorted array than in an unsorted array.

6 0
3 years ago
What panel in the unity Editor shows the objects in the scene
Neporo4naja [7]

Answer:

A. The Hierarchy

Explanation:

The console tells you if there are any errors

The inspector shows you settings for one object

The project is the whole thing

7 0
4 years ago
A print server uses a print ________ as a software holding area for jobs waiting to be printed.
vichka [17]

Answer:

spooler

Explanation:

A print server uses a print spooler as a software holding area for jobs waiting to be printed.

8 0
2 years ago
Read 2 more answers
A closed-source product is typically free.TrueFalse
CaHeK987 [17]

Answer:

False

Explanation:

A closed-source product is often closed-source to protect intelectual property and prevent replication.

6 0
3 years ago
Use the provided MS-Excel template to note entries for each .pcap file in Wireshark that are of interest, as well as your assess
zhenek [66]

Answer:You should note entries for each PCAP file in Wireshark that are of interest as from ENCM 369 at ... file in Wireshark that are of interest, as well as your assessment of potential vulnerabilities. Such vulnerabilities might be due to plaintext data exchange between two machines, which might be exploitable by session hijacking, ...

Explanation:

4 0
3 years ago
Other questions:
  • Ted is a fashion designer. Where is he most likely to work
    9·1 answer
  • Describe in detail how to determine if a source is credible when conducting research. Justify your response using two or more co
    8·1 answer
  • Which one of the following is not the name of a 20th century school composition
    14·2 answers
  • A cyber community is different than a physical community because _________________. A.people can go to restaurants to meet frien
    13·1 answer
  • An _____ is a set of directions for carrying out a task.
    14·1 answer
  • How do assembly language different from machine language?
    15·1 answer
  • What is c also write it's features
    8·2 answers
  • What features do plain text editors support?
    12·1 answer
  • Mathematics and modern technology​
    14·1 answer
  • Select the correct text in the passage.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!