1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lawyer [7]
4 years ago
10

Send a document as a PDF when A. you want the recipient to make changes to the file. B. it needs to be printed. C. it contains m

aterial you don't want changed. D. you save the file for the first time.
Computers and Technology
1 answer:
Julli [10]4 years ago
3 0
A PDF must be put into an external program after being exported to be edited, you can't make direct changes to it. This eliminates answer choice A.

You can print documents with other extensions besides .pdf, such as those of Word documents and such, it doesn't have to be a .pdf. This eliminates answer choice B.

Since you can't directly edit a PDF, C is a possible answer.

Files don't have to be saved as a .pdf, especially just for the first time. Whenever you save a file, first time or not, you can save it as anything, and there's no reason to have to save it as a .pdf. This eliminates answer choice D.

So the answer is C. it contains material you don't want changed.

Hope this helps!
You might be interested in
Use the drop-down menus to complete statements about archiving and backing up data fileArchiving data files manages the size of
svetoff [14.1K]

Answer:

Archiving data files manages the size of a mailbox for  

✔ local

storage.

Creating an Outlook data file  

✔ protects

data files in storage on a computer.

Explanation:

Because its right.

3 0
3 years ago
Read 2 more answers
Donna often travels around the world. When she travels, she needs to access her emails from different locations. However, to kee
Tju [1.3M]

Answer:

Yahoo! mail

Explanation:

In the context, Dona travels most often around the world. While traveling, she has to access her emails from different location and at different times. But in order to keep her luggage light, she never carries the laptop with her. Therefore, Donna uses Yahoo! mail to access her emails.

Donna uses Yahoo mail because she can install the Yahoo! mail app in her phone or tablets which is small in size and of light weight. She is able to organize her Outlooks,  Google mails and  Yahoo accounts. In Yahoo! mail, Donna is also able to sign in with her any of the non yahoo accounts and it also provides free cloud storage space.

8 0
3 years ago
Read 2 more answers
Is data mining a simple transformation or application of technology developed from databases, statistics, machine learning, and
frozen [14]

Answer:

No.

Explanation:

Data mining is a process that involves extracting large data from a database to be used in data analytics. It is a tool in analytics for provision of wanted data.

It uses databases, statistics, machine learning and pattern recognition to extract, clean and cluster data based on data types classification. It involves integration of data rather than just a simple transformation.

7 0
3 years ago
Read 2 more answers
What is a word processing program? Give examples of word processing programs.
Kipish [7]

Answer:

A word processor, or word processing program, does exactly what the name implies. It processes words. It also processes paragraphs, pages, and entire papers. Some examples of word processing programs include Microsoft Word, WordPerfect (Windows only), AppleWorks (Mac only), and OpenOffice.org.

8 0
3 years ago
Describe, with examples, the way in which a defect in software can cause harm to a person, to the environment, or to a company
Arisa [49]

Answer:

Losing jobs. Fire. Destruction of property.

Explanation:

Having a company shut down due to lack of protection and having people testify products unsafe. If software blows up it could cause desturction of property therefore causing the effect of many people losing their jobs.

4 0
3 years ago
Other questions:
  • Melinda completed the Computer Programming Aptitude Test when she applied for a position with Beta Electronics. Six months later
    12·1 answer
  • We are tall straight and upright who are we
    7·2 answers
  • Print and digital forms of communication, including television, newspapers, radio, and Internet, intended to convey information
    8·1 answer
  • Write a program segment that simulates flipping a coin 25 times by generating and displaying 25 random integers, each of which i
    5·1 answer
  • Dany needs to fact check notes she took on 19th
    13·1 answer
  • Which features of words are used to separate numbers and texts into columns
    11·1 answer
  • The arguments in a method call are often referred to as ____ . The variables in the method declaration that accept the values fr
    10·1 answer
  • You’re dying to see the flaming eyelashes in concert this summer what’s the best way to cop a few tickets
    6·1 answer
  • See the lseek_example.c file. Modify the lseek_example.c, such that it reads from an input file (named "start.txt") and will pri
    6·1 answer
  • ____ includes) all tools that capture, store, process, exchange, and use information.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!