1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Readme [11.4K]
3 years ago
5

Which of the following documents cannot be created using the Microsoft® Word® application?

Computers and Technology
2 answers:
denis23 [38]3 years ago
7 0
The correct answer is C. Customer spreadsheet
san4es73 [151]3 years ago
7 0
(B) business flyer ....
You might be interested in
What is a mixer? BTW NOT just any mixer....a mixer in music<br> THis is for tech theater class
ASHA 777 [7]

Answer:

it changes the level of music, such as bass level or sweter level

6 0
3 years ago
Suppose for the worst case, given input size n: Algorithm 1 performs f(n) = n2 + n/2 steps Algorithm 2 performs f(n) = 12n + 500
melomori [17]

Answer:

29

Explanation:

for n=28:

--------------

Algorithm 1 performs f(n) = n2 + n/2 = 28*28 + 28/2 = 798

Algorithm 2 performs f(n) = 12*28 + 500 = 836

for n=29

--------------

Algorithm 1 performs f(n) = n2 + n/2 = 29*29 + 29/2 = 855.5

Algorithm 2 performs f(n) = 12*29 + 500 = 848

so, for n=29, algorithm 2 will be faster than algorithm 1

6 0
3 years ago
There are ____ standard colors for text in a theme.
soldier1979 [14.2K]
In microsoft powerpoint there are 2 or two standard colors for text in a theme. If you use a theme on your presentation, a theme is always equipped with two types of colors for the text, because it gives you more options on what color suits your text and blends with the theme perfectly.
7 0
3 years ago
The list below shows the number of text messages that five students sent from
liraira [26]

Answer:

Explanation:dhjyfxdhnjfddhjnvcdfg

3 0
3 years ago
When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate web
timofeeve [1]
A spoofing attack. "<span>a situation in which one person or program successfully masquerades as another by falsifying data, thereby gaining an illegitimate advantage."</span>
8 0
3 years ago
Other questions:
  • A downloaded executable file may contain harmful software known as
    13·2 answers
  • How does technology improve productivity at home? (Select all that apply.)
    5·1 answer
  • A database can be used to manage which of the following for a website?
    13·1 answer
  • A(n) ____ represents a particular type of object in the real world.
    7·1 answer
  • Which of the following is used to describe the information used in
    12·1 answer
  • Unless grunkle stan pines is mistaken, there is a family of deer’s in his garden
    6·1 answer
  • Rectangular box formed when each column meet​
    11·1 answer
  • Software that allows users to use and adapt it for any purpose, often allowing the public to participate in further development
    7·2 answers
  • 3.5 code practice question 1
    5·2 answers
  • What is a trusted computing base (TCB)? Hosts on your network that support secure transmissions The operating system kernel and
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!