1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pochemuha
3 years ago
9

(a)Ms word is a isa word processing software ,(b)hub provides physical connection between all computers, State true or false​

Computers and Technology
2 answers:
8090 [49]3 years ago
8 0

Answer:

true

Explanation:

true in answer in the question

Natasha2012 [34]3 years ago
4 0

Answer:

it is true

hope it helps

You might be interested in
What is the difference between computer hardware and computer software?<br>​
Ipatiy [6.2K]

Answer:

computer Hardware:-The physical of the computer which can be seen or touched is called computer hardware☆Computer needs these hardware devices for performing basic functions like accepting data and instructions .Example(keyboard,mouse,printer etc.)

Computer software:-The collection of programs that makes computer worked is called software☆Computer needs software to instruct tge computer hardware what to do and how to do .Example(windows 7,windows 10,Microsoft paint etc.)

7 0
3 years ago
There is an interface I that has abstract class AC as its subclass. Class C inherits AC. We know that C delegates to an object o
Aloiza [94]

Answer:

are u in HS or college work

I am trying to understand

6 0
2 years ago
A threat analyst is asked about malicious code indicators. Which indicator allows the threat actor's backdoor to restart if the
joja [24]

Indicators of compromise enable system administrators and information security professionals to detect intrusion attempts or malicious activities.

Your information is incomplete as the options aren't provided. Therefore, an overview of indicators of compromise will be given.

Indicators of compromise means the pieces of forensic data that are found in files or system log entries to identify malicious activity on a network or system.

Indicators of compromise help IT and information security professionals to detect malware infections, data breaches, etc. Examples of indicators of <em>compromise</em> include log-in red flags, unusual outbound network traffic.

Read related link on:

brainly.com/question/25522987

8 0
3 years ago
What will save you the most money when trying to reduce the cost of college
julia-pushkina [17]

most probably housing and food

6 0
3 years ago
Read 2 more answers
Which of the statements below is true?
emmainna [20.7K]

The given statement that is true is; B: The Formatting, Standard, and Drawing toolbars are displayed.

<h3>Which statement is true of microsoft word?</h3>

In Microsoft word, there are different toolbars that are useful in operation. Now, from the given image from Microsoft word, we can see that toolbar is clicked. However in the fly-down from it, we see that the standard, formatting and drawing toolbars are ticked and as such they are the ones displayed.

Looking at the options, the correct one is Option B because it tells us that Formatting, Standard, and Drawing toolbars are displayed.

Read more about a true statement at; brainly.com/question/25605883

8 0
2 years ago
Other questions:
  • What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter d
    9·1 answer
  • When a packet with the code is transmitted, it is received and processed by every machine on the network. this mode of operation
    12·1 answer
  • WHAT DOES THE WORD MONOCHROME MEAN?
    11·1 answer
  • Which of the following is not a method of data management?
    15·1 answer
  • Explain why this scenario could put an organization in jeopardy of losing some of its workforce.
    12·1 answer
  • Which of the following shows the correct order of inventions that helped the first computers make calculations?
    9·1 answer
  • The…..executed simple
    8·2 answers
  • Exam Instructions
    6·1 answer
  • ________ technologies are technologies that enable the incremental improvement of products and services.
    10·2 answers
  • Write an answer in three to five sentences that describes the photo, explains what better lighting would mean for your photograp
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!