1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kap26 [50]
4 years ago
11

Which view shows how the document will look when printed?

Computers and Technology
1 answer:
DIA [1.3K]4 years ago
7 0
Please provide photos for your question.
You might be interested in
Moving Images are called________.
Troyanec [42]

Answer:

films

Explanation:

- Pictures, comic strips, and animations is wrong because they are static images.

- Films are known as "moving pictures" and therefore are moving images. That makes film your correct answer.

- Hope this helps! If you would like a further explanation please let me know.

6 0
4 years ago
How serious are the risks to your computer security?
ASHA 777 [7]

The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

<h3>What are the risk results for information and computer security?</h3>

The term “information security risk” is known to be those  damage that occurs due to  an attacks against IT systems. IT risk is made up of a wide range of potential events, such as data breaches, regulatory enforcement actions, financial costs, and a lot more.

Some Examples of malware are viruses, worms, ransomware, spyware, and a lot others.

Hence, The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

Learn more about computer security from

brainly.com/question/12010892

#SPJ1

6 0
2 years ago
Create a Word document or text file named Part3 that contains answers to the following:
Gnoma [55]

Answer:

11111

Explanation:

4 0
3 years ago
Select the correct answer.
Gnesinka [82]

Answer:

D.

Explanation:

I think.

4 0
2 years ago
How can u get this off us keybored chromme book
WITCHER [35]
Click the icon at the bottom of the screen that says “US” it should go away
5 0
4 years ago
Other questions:
  • Write a Java method that will take a string and reverse it. Can you come up with a method that is faster than regular reversing
    7·1 answer
  • Based on the type of document you want to create, you must first select the page
    15·2 answers
  • T.J. wants to send a friend a file with a funny dancing cat. Which file format should T.J. use?
    13·2 answers
  • There are six different sequences for the three approval tasks: check inventory; check credit; check special terms.
    5·1 answer
  • Write the name of the tab, the command group, and the icon that you need to use to justify
    14·1 answer
  • True/False: The American Standard Code for Information (ASCII) is a code that allows people to read information on a computer.
    9·2 answers
  • Given two integer variables distance and speed, write an expression that divides distance by speed using floating point arithmet
    13·1 answer
  • How do you code a website?
    10·1 answer
  • Which key(s) will launch the Spelling Checker dialog box? F8 F7 Ctrl+H F2
    11·2 answers
  • EEEEEEEEEEEEEEEEEEEEEEEEFFFFFFFFFFFFFFFFFFFFFFFFFFGGGGGGGGGGGGGGGGGGGGGGGGGGGGGHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHIIIIIIIIIIIIIIII
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!