1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Liono4ka [1.6K]
3 years ago
8

Choose the list of the best uses for word processing software.

Computers and Technology
1 answer:
Marina86 [1]3 years ago
4 0
List, resumes, spread sheet, databases, contracts
You might be interested in
I am trying to code a lifting simulator game on ro-blox. These problems listed in the third picture tells you the problems. If y
ipn [44]

Answer:

cool

Explanation:

3 0
3 years ago
Read 2 more answers
A final class can't be extended.TrueFalse
PIT_PIT [208]

Answer:

True

Explanation:

A final class is something like sealed one and no one can inherit that further.

it is useful to lock our code or functionality from others

4 0
3 years ago
Consider a system running ten I/O-bound tasks and one CPU-bound task. Assume that the I/O-bound tasks issue an I/O operation onc
Dmitriy789 [7]

Answer:

10 minutes

Explanation:

3 0
3 years ago
If you type too much text on a PowerPoint slide, the additional text is added to a second slide.
Snowcat [4.5K]

Answer:

This is false

The text just goes out of the slide and you can't see it until you lower the font size or until you delete some of it.

Explanation:

5 0
3 years ago
In 2016, NIST published a new Federal Master Cybersecurity Framework to create a mandatory framework for managing cybersecurity
ICE Princess25 [194]

Answer:

In 2014, NIST published a new Federal Master Cybersecurity Framework for managing cyber risk for the delivery of critical services. So the correct answer is False.

Explanation:

NIST published the Federal Master Cybersecurity Framework to managing risk for the delivery of critical services. The U.S. issued Framework on February 12, 2014.

8 0
3 years ago
Other questions:
  • A layer of control in each communicating device that provides functions such as flow control, error detection, and error control
    13·1 answer
  • what type of authentication does the dod require to accesss sensitive data on mobile devices and /or email
    7·2 answers
  • You are the IT administrator for a small corporate network. You have installed the Windows Server 2016 operating system on a ser
    12·1 answer
  • Which of the following describes the term "false information?"
    5·1 answer
  • What types of information are commonly included in headers and footers? Check all that apply.
    10·1 answer
  • (fill in the blank) <br><br> ____ is when data is formatted, transmitted and received in a network.
    13·1 answer
  • How are IP addresses usually written?
    7·1 answer
  • Kamal plans to offer new, more favorable contracts to business customers who are now receiving a discount and use wireless servi
    7·1 answer
  • What is geolocation?
    8·1 answer
  • Which of the following do nylon and Kevlar fibers have in common?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!