1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LuckyWell [14K]
3 years ago
6

Analyzing Uses for PDFs

Computers and Technology
1 answer:
Sauron [17]3 years ago
4 0

Answer:

You need to send a file to someone who does not have Word

Explanation:

In this case the answer is You need to send a file to someone who does not have Word.

But we use PDF to send files without changing its format.

You might be interested in
confidentiality ensures that only those with the rights and privileges to access information are able to do so.
Lapatulllka [165]

Confidentiality ensures that only those with the rights and privileges to access information are able to do so is a True statement.

<h3>What is confidentiality?</h3>

This is known to be the act of not sharing client information with people who are known to be a third party.

Note that confidentiality is said to be very important due to the fact that the Failure to protect and secure any kind of confidential information can make or lead to the loss of business as well as clients.

It is one that can even open the door to possible  danger of confidential information being misplace, misused to commit illegal activity.

Therefore, Confidentiality ensures that only those with the rights and privileges to access information are able to do so is a True statement.

Learn more about Confidentiality  from

brainly.com/question/863709

#SPJ1

Confidentiality ensures that only those with the rights and privileges to access information are able to do so. True or False

True

7 0
1 year ago
Amanda works in a manufacturing company. Recently, she learned that her male counterparts are paid higher wages than her. When A
vlabodo [156]
Alright bud the answer you will be looking for will be the equal pay act of 1963 it basically says equal pay for equal work
6 0
3 years ago
Read 2 more answers
In the cpt coding system, when there is no code to properly represent the work performed by the provider, the coder must use thi
nexus9112 [7]
The multiple answers for the question above are

a) <span>Not elsewhere classifiable
b) </span><span>Unlisted procedure
c) </span><span>Not otherwise specified
d) </span><span>Miscellaneous code

The answer is b) Unlisted procedure
<span>In the case where there is no Cat. I or Cat III code to describe the procedure, then Unlisted procedure is used</span>
</span>
8 0
3 years ago
Are Proxy Servers illegal if im using it to surpass Facebook or something because it is banned
Softa [21]
I don't think they are illegal, though you might get in trouble by administration

5 0
3 years ago
Which system board has a 64-bit bus?
erik [133]

Answer:  https://en.wikipedia.org/wiki/64-bit_computing

64-bit computing - Wikipediaen.wikipedia.org › wiki › 64-bit_computing

In computer architecture, 64-bit integers, memory addresses, or other data units are those that are 64 bits (8 octets) wide. Also, 64-bit central processing unit (CPU) and arithmetic logic unit (ALU) architectures are those that are based on processor registers, address buses, or data buses of that size. ... With no further qualification, a 64-bit computer architecture ...

‎History · ‎64-bit operating system... · ‎64-bit applications · ‎64-bit data models

Explanation:

5 0
3 years ago
Other questions:
  • The amount of money you can charge to a credit card is called
    7·1 answer
  • the header, in an academic report, typically contains the author’s name and the current page number true or false
    6·1 answer
  • why does it not let me create a new account when i log out of this one and go to join now after i fill everything out it wont le
    11·1 answer
  • All the following are graphic file formats except<br>HTML<br>BMP<br>png<br>Tiff​
    5·1 answer
  • Which is the first thing that would happen if a plant could NOT obtain carbon dioxide? A It would not be able to reproduce. B It
    5·1 answer
  • To secure the company website, the webmaster suggests that the company purchase a secure certificate to encrypt all communicatio
    5·1 answer
  • Shannon needs to select text from multiple locations which are not next to each other in her document. Which of the following ke
    8·2 answers
  • Define global variables called highestNum, userInput and sumOfNums and initialize them. In Main call 2 methods: 1) UserData() 2)
    5·1 answer
  • Write a program that prints the following 45 pairs of numbers:
    8·1 answer
  • Which of the following is a type of logical function?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!