1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LuckyWell [14K]
3 years ago
6

Analyzing Uses for PDFs

Computers and Technology
1 answer:
Sauron [17]3 years ago
4 0

Answer:

You need to send a file to someone who does not have Word

Explanation:

In this case the answer is You need to send a file to someone who does not have Word.

But we use PDF to send files without changing its format.

You might be interested in
Add comma(s) where needed, if needed.
guajiro [1.7K]

Answer:

My birthday, October 31, 2005, is on Halloween.

Explanation:

4 0
2 years ago
How do graphic designers showcase their work?
Luda [366]

They showcase it digitally since their work is done on computers.

6 0
3 years ago
Read 2 more answers
Read the four detective reports and the combined affidavit and warrant for the M57 Patents case. Write a one- to two-page paper
Fantom [35]

Answer:The 2009-M57-Patents scenario tracks the first four weeks of corporate history of the M57 Patents company. The company started operation on Friday, November 13th, 2009, and ceased operation on Saturday, December 12, 2009. As might be imagined in the business of outsourced patent searching, lots of other activities were going on at M57-Patents.

Two ways of working the scenario are as a disk forensics exercise (students are provided with disk images of all the systems as they were on the last day) and as a network forensics exercise (students are provided with all of the packets in and out of the corporate network). The scenario data can also be used to support computer forensics research, as the hard drive of each computer and each computer’s memory were imaged every day.

Explanation:

4 0
3 years ago
What is the keyboard shortcut to display the merge to printer dialog box?
sp2606 [1]
Alt + Shift + M are the keyboard shortcuts to display the merge to printer dialog box.
3 0
3 years ago
What is a man-in-the-middle attack​
VMariaS [17]

Answer: An attack where the attackers will interrupt a data transfer happening between parties and in which they will pretend to be the legitimate parties.

Explanation: For example think about two people writing letters to each other back and forth. However you, the attacker can intercept the letters and effectively change the message/contents of the letter going to the other person. This is probably not the best explanation, but simply put a man-in-the-middle attack is when an attacker interupts a transfer and pretends to be the legitimate source.

4 0
2 years ago
Read 2 more answers
Other questions:
  • Hit and Slopes Program: A Write a program that can be used by a ski resort to keep track if local snow conditions for one week.
    15·1 answer
  • What is the main storage device where the computer stores data?
    15·1 answer
  • Why does people that gets abused not report?
    5·1 answer
  • Write a function that iteratively appends random 1's and 0's to an array to form a binary number. The function returns the binar
    13·1 answer
  • What are three reasons teens might start drinking alcohol??
    7·2 answers
  • How do computer users benefit from the increased speed?
    9·1 answer
  • -) An attribute is a(n)?
    5·1 answer
  • Use the drop-down menus to complete each statement. Two main versions of Outlook are the desktop app and the app. The has limite
    15·2 answers
  • Tiền tệ ra đời là kết quả
    7·2 answers
  • an existing technology that would allow users to transfer images from the camera to the computer without connecting them
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!