1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
swat32
3 years ago
8

What feature does google docs have to allow users to work in a document?​

Computers and Technology
1 answer:
Pavel [41]3 years ago
6 0

Answer:

Share.

Explanation:

Go to the Share button in the top right corner of the doc, and click it. Then type the email adress of who you want to work on it. (make sure the symbol to the right of the email is a little pencil Icon)

You might be interested in
A drug like cocaine cause more dopamine to be produce in the brain
Murrr4er [49]
The answer is true. I took the test.
8 0
3 years ago
Read 2 more answers
A worksheet can have a maximum of number of rows​
Natasha_Volkova [10]
1,048,567 rows


I don’t really understand the question

Although you're limited to 255 sheets in a new workbook, Excel doesn't limit how many worksheets you can add after you've created a workbook. The only factor that ultimately limits the number of worksheets your workbook can hold is your computer's memory.

A Range is a group of selected Cells in an Excel worksheet. A Range can be rectangular or square in shape. You can select a Range by left-click, drag and release the mouse over the cells you want to select. ... Similarly, a Range in Excel worksheet is identified by a Range Address.
5 0
3 years ago
Read 2 more answers
Two of the goals of community mobilization are getting the community interested and
Darina [25.2K]

Answer:

Two of the goals of community mobilization are getting the community interested and <u>hosting social change.</u>

8 0
3 years ago
HELP ME PLEASE
MAXImum [283]

Explanation:

Threats

Computer Security Threats are possible dangers that can affect the smooth functioning of your PC. These may be a small piece of adware or a harmful Trojan malware. In the present age, computer security threats are constantly increasing as the world is going digital. computer security threats

Types of Computer Security Threats

There are several types of computer security threats such as Trojans, Virus, Adware, Malware, Rootkit, hackers and much more. Check some of the most harmful types of computer Security Threats.

COMPUTER VIRUS

A Computer Virus is a malicious program, which replicates itself and infects the files and programs of your PC and can make them non-functional.

COMPUTER WORMS

A self-replicating computer program that spreads malicious codes, computer worms make use of the network to send copies of the original codes to other PCS. It can also go to the extent of sending transferring documents utilizing the email of the user.

SCAREWARE

Scareware is a malware that tricks victims to buy software by displaying fake virus alerts. A scareware infected PC may get pop-ups of fake malware threats and to get rid of those, users are prompted to purchase a fake anti-malware software.

KEYLOGGER

Also known as a keystroke logger, Keyloggers can track the real-time activity of a user on his computer. Keylogger runs in the background and records all keystrokes made by a user and passes the information to the hacker with the motive to steal password and banking details.

ROOTKIT

A rootkit is considered extremely dangerous as they appear to be legitimate files and deceives the computer user. Rootkit masks viruses and worms and makes them appear as necessary files. These are very difficult to remove and only an antivirus with the anti-rootkit feature can remove a rootkit.

Tips for Best Computer Security

For best computer security, you must follow certain guidelines, which are also called computer best practices. 1. Use the best antivirus software, which not only provides protection to your PC but also internet protection and guards against cyber threats. 2. Do not download untrusted email attachments and these may carry harmful malware. 3. Never download software from unreliable sites as they may come with a virus that may infect your system as soon as you install the software.

4 0
2 years ago
You want to plug a keyboard into the back of a computer. you know that you need to plug the keyboard cable into a ps/2 port. whi
Helga [31]

<span>Often referred to as the mouse port or keyboard port, the PS/2 port was developed by </span><span>IBM and is used to connect a computer mouse or keyboard to an IBM compatible computer. <span>Its name originates from the IBM Personal System/2 arrangement of PCs, with which it was propelled in 1987.</span></span>

7 0
3 years ago
Other questions:
  • How can I logout and log in?
    10·1 answer
  • The chain of command is an unbroken line of authority that extends from the top of the organization to the lowest echelon and cl
    7·1 answer
  • Ethics in businesses and organizations are made up of a set of moral principles that guide the organizations. Discuss how good w
    8·1 answer
  • Name three actions you can perform on an inserted image.
    7·2 answers
  • Riodic Table
    6·1 answer
  • The at command is used to _______________.
    15·1 answer
  • LensForAll is a company that sells affordable contact lenses on its website. The CEO of the company realizes that an app must be
    9·1 answer
  • Zahra's softball team needs money for team T-shirts. The coach makes some fundraising suggestions, while team members brainstorm
    5·2 answers
  • Who is known as the first computer programmer?​
    13·1 answer
  • Question 7 of 25
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!