1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fynjy0 [20]
3 years ago
14

What were the goals of the “paperless society” ideal?

Computers and Technology
2 answers:
Vaselesa [24]3 years ago
4 0
It was to replace paper with electronic communication and storage
matrenka [14]3 years ago
4 0
It help save tree and don't need use paper when you can do everything on computers or phone
You might be interested in
Which key temporarily activates the Hand tool?​
Nezavi [6.7K]
Holding down a key temporarily activates a tool
7 0
4 years ago
If an OS is using paging with offsets needing 12 bits, give the offset (in decimal or hexadecimal) to: the third word on a page
Mariulka [41]

Answer:

Explanation:

If an OS is using paging with offsets needing 12 bits, give the offset (in decimal or hexadecimal) to: the third word on a page the last word on a page.

7 0
3 years ago
What font family is Times New Roman an what font family is Arial?
Alexxandr [17]

Answer:

Some Font Examples

Generic Font Family                 Examples of Font Names

Serif                    Times New Roman Georgia Garamond

Sans-serif                          Arial Verdana Helvetica

Monospace                     Courier New Lucida Console Monaco

Cursive                        Brush Script MT Lucida Handwriting

Explanation:

hope it help

4 0
3 years ago
Read 2 more answers
Which operating system introduced new features such as virtual memory and
EleoNora [17]

it was a Macintosh which was released by Apple may 13th 1991.

6 0
3 years ago
How computer viruses spread from one computer to another​
morpeh [17]
Viruses spread when the software or documents they get attached to are transferred from one computer to another using a network, a disk, file sharing methods, or through infected e-mail attachments. Some viruses use different stealth strategies to avoid their detection from anti-virus software.
8 0
3 years ago
Other questions:
  • g The reciprocal Fibonacci constant ψ is defined by the infinite sum: ψ=∑n=1 [infinity] 1 Fn Where Fn are the Fibonacci numbers
    7·1 answer
  • How globalization is related to communication technology?
    6·1 answer
  • To share a document in my online electronic journal, I should select the option to _____.
    14·1 answer
  • Which of the following devices are least likely to deny a connection inline when an attack is detected? (select 2)
    6·1 answer
  • Time Conversion C++: Given a time in -hour AM/PM format, convert it to military (24-hour) time.
    9·1 answer
  • Sorry but, what are brainliest for?
    7·2 answers
  • 4.2 Code Practice: Question 2​
    14·1 answer
  • 52. An assignment statement will:
    11·2 answers
  • Please help! first one to answer correctly gets brainliest and thanked
    7·1 answer
  • Pls answer i will give 20 points
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!