1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
eduard
3 years ago
5

Directions for starting the computer and opening a word processor document

Computers and Technology
1 answer:
aleksandr82 [10.1K]3 years ago
4 0
First you download word after you open a page  and you start 
You might be interested in
What are the functions of information technology?
Gekata [30.6K]

There are six basic functions of IT.

1. Capture: Compiling detailed records of activities.

2. Processing: Converting, analyzing, computing and synthesizing all forms of data and information.

3. Generation: Organizing information into a useful form.

4. Storage: Retaining information for further use.

5. Retrieval: Locating and copying stored data or information for further processing or for transmission to another user.

6. Transmission: Distributing information over a communication network.

3 0
2 years ago
Pls help!!
alexira [117]

Answer:

4.24

Explanation:

First you find the mean of the data set, which is 7. Then to find standard deviation you have to follow the formula which tells you to subtract the mean from each number under the square root : √(2 - 7)^2 + (9 - 7)^2 + (10 - 7)^2 + (4 - 7)^2 + (8 - 7)^2 + (4 - 7)^2 + (12 - 7). Once you solve the parenthesis you square it, once you square it the negatives won't matter. That will leave you with this : √(25 + 4 + 9 + 9 + 25). The formula tells you to find the sum of those numbers (which is 72) then subtract one from how many numbers there are, 5 - 1 = 4, and divide your sum by that number. So 72 / 4 = 18. Then you find the square root of 18 and that becomes your answer.

7 0
2 years ago
Why might reading a product review be a good idea before purchasing a product?
hichkok12 [17]

   This is a good question! Knowing what others think about a product is very helpful before purchasing it. Also knowing the rating is good too. For example I bought a dress off of Amazon and I never looked at the ratings before I bought it, and once I got it in the mail...It looked NOTHING like the picture.

 I hope this was helpful for you!

3 0
4 years ago
Read 2 more answers
You received a call from a user who brought her own device to the office but cannot find or connect to the company WLAN. The lap
nignag [31]

Answer:

d. Company WAP has SSID broadcast disable

Explanation:

The most likely reason the user cannot find the company WLAN from her own device is that company WAP has SSID broadcast disable.

8 0
4 years ago
The K-Means algorithm terminates when:_______
gavmur [86]

Answer:

b. the cluster centers for the current iteration are identical to the cluster centers for the previous iteration.

Explanation:

K-mean algorithm is one of the mot widely used algorithm for partitioning into groups of k clusters. This is done by partitioning observations into clusters which are similar to each other. When using k-mean algorithm, each of the different clusters are represented by their centroid and each point are placed only in clusters in which the point is close to cluster centroid.

The K-Means algorithm terminates when the cluster centers for the current iteration are identical to the cluster centers for the previous iteration.

7 0
4 years ago
Other questions:
  • What engine component is shown in the above Figure?
    14·2 answers
  • Rite a c++ function, smallestindex, that takes as parameters an int array and its size and returns the index of the first occurr
    15·1 answer
  • Which of the following is a good technique to use when driving in an urban environment
    6·2 answers
  • In Labrador retrievers, black coats are dominant and brown coats are recessive. What is the genotype of a brown Labrador?
    5·1 answer
  • It’s illegal to hack into a system without authorization, but is it ethical for a gray-hat to hack into a system if the intent i
    7·1 answer
  • Which access modifier is not allowed in a struct? Private Public Protected Internal All of the Above None of the Above A block {
    11·1 answer
  • State what’s printed for each println in the code below:
    6·1 answer
  • Which statement assigns the value 140 to the variable streetNumber in Python?
    13·1 answer
  • Please Help!
    9·1 answer
  • Do companies speed up internet when you run speed test
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!