1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Liono4ka [1.6K]
4 years ago
8

Choose the list of the best uses for word processing software.

Computers and Technology
1 answer:
Marina86 [1]4 years ago
4 0
List, resumes, spread sheet, databases, contracts
You might be interested in
Assessment
muminat

Answer:

A. With content-based filtering, users

receive recommendations for items

liked by similar users.

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.

Content-based filtering uses an algorithm to recommend to users what they like.

The statement about content-based filtering which is false is that, with content-based filtering, users

receive recommendations for items

liked by similar users.

6 0
3 years ago
A ____ is harmful computer code that spreads without your interaction, slipping from one network to another and replicating itse
blondinia [14]
Malware is the answer

3 0
4 years ago
Why is it preferable to code web pages in html format?
Ronch [10]
Depends on what you are working on.

If you are working on a website I recommend Adobe Dreamweaver CC.

if its small assignments that doesnt involve major work, I'd use something like notepad++
8 0
4 years ago
Read 2 more answers
Which type of testing is used to test how well the system will perform with a workload?
lys-0071 [83]

Answer:

Performance Testing

Explanation:

The Correct option is - Performance Testing

Reason -

INTEGRATION TESTING is a level of software testing where individual units / components are combined and tested as a group. The purpose of this level of testing is to expose faults in the interaction between integrated units.

PERFORMANCE TESTING  is a testing measure that evaluates the speed, responsiveness and stability of a computer, network, software program or device under a workload.

UNIT TESTING is a type of software testing where individual units or components of a software are tested. The purpose is to validate that each unit of the software code performs as expected.

Acceptance testing, a testing technique performed to determine whether or not the software system has met the requirement specifications.

5 0
3 years ago
PLEASE I NEED HELP WITH THIS I WILL GIVE BRAINLIST!!!!!
Neko [114]
It would be so you like chocolate because there is only two options. Yes or no
8 0
3 years ago
Read 2 more answers
Other questions:
  • Nathan, a civil engineer in a construction company, is one of the best performers in the organization. He is assigned challengin
    9·1 answer
  • What is an extrinsic value? A. something that is valuable in and of itself B. something that is valuable because it leads to ano
    12·1 answer
  • 1.) You are a digital forensic examiner and have been asked to examine a hard drive for potential evidence. Give examples of how
    13·1 answer
  • A common type of non-volatile memory is _____.
    12·1 answer
  • Write a script that calculates the common factors between 8 and 24. To find a common factor, you can use the modulo operator (%)
    14·1 answer
  • Jennifer is trying to install an anti-malware program on a computer that she believes might be infected. During the installation
    14·1 answer
  • What are two reasons people work?
    7·2 answers
  • A 9-year old male castrated Westie presents on emergency after being rescued from a house fire. On presentation, the dog has a r
    9·1 answer
  • D. What is the work of the following features:<br>1. Foot note​
    10·1 answer
  • The keys to successful outsourcing are accountability, reporting, and ___
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!