1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
faltersainse [42]
3 years ago
14

Describe Ms word environment.​

Computers and Technology
1 answer:
Alexeev081 [22]3 years ago
8 0

On Microsoft Word, you can edit your Word.... You can add pictures, do journals, do menus, and stuff like that... You can add color to text, make lists, add shapes to your Word, etc...

You might be interested in
Which item is developed last in the cyclical process?
swat32

Answer:

Design Process

Explanation:

The multistep process by which designers and engineers design, build, and taste a new product is called the Design Process. There are multiple steps, including exploring, designing, planning, making, testing, and revising.

7 0
2 years ago
Read 2 more answers
A step commonly used for Internet vulnerability assessment includes __________, which occurs when the penetration test engine is
lakkis [162]

Complete Question:

A step commonly used for Internet vulnerability assessment includes __________, which occurs when the penetration test engine is unleashed at the scheduled time using the planned target list and test selection.

Group of answer choices

A. scanning

B. subrogation

C. delegation

D. targeting

Answer:

A. Scanning.

Explanation:

A step commonly used for Internet vulnerability assessment includes scanning, which occurs when the penetration test engine is unleashed at the scheduled time using the planned target list and test selection.

Internet vulnerability assessment can be defined as the process of defining, analyzing, measuring, identifying, classification and prioritization of vulnerabilities in network resources used to access the internet. The main purpose of an internet vulnerability assessment is to provide necessary informations or data about the threats being posed to an individual or organization through the use of a scanning program or system such as a network security scanner

7 0
3 years ago
On the MarketingConsultants worksheet, in cells D10:H13, use a PMT function to calculate the end of the month payment amount. En
vitfil [10]

Answer:

sdddddddde22

Explanation:

5 0
3 years ago
Just a smol question how do i change my username on this?
strojnjashka [21]

Answer:

If you want to change your username, you have to contact them and tell them that you want to change. That is the only way.

Explanation:

7 0
3 years ago
Read 2 more answers
How to give answer like this?????
creativ13 [48]

Answer:

possibly he made an image in the photo or this

Explanation:

\large\boxed{\mathfrak{hi}}

8 0
3 years ago
Other questions:
  • Consider a simple application level protocol built on top of udp that allows a client to retrieve a file from a remote server re
    15·2 answers
  • What is the name for the percentage of people who don't have jobs in a country or area?
    11·2 answers
  • What item on a business card is generally the most prominent?
    10·2 answers
  • A microphone is a type of electronic.<br><br> True/Faulse
    14·1 answer
  • Instructions:Select the correct answer.
    5·1 answer
  • What is the typical educational requirement for a non-entry level software programmer? high school diploma technical certificate
    10·1 answer
  • The easiest way to run a web page that’s already in your browser after you’ve made changes to the code for the page is to
    6·1 answer
  • How would asking questions or defining problems be used in this career?<br> -
    13·1 answer
  • Is this very epik or not?
    9·2 answers
  • Daily IT Question
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!