1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LuckyWell [14K]
3 years ago
6

Analyzing Uses for PDFs

Computers and Technology
1 answer:
Sauron [17]3 years ago
4 0

Answer:

You need to send a file to someone who does not have Word

Explanation:

In this case the answer is You need to send a file to someone who does not have Word.

But we use PDF to send files without changing its format.

You might be interested in
Which of the following scenarios falls into the category of network crimes?
solong [7]

Answer:

B

Explanation:

Hope it helps!

3 0
2 years ago
Read 2 more answers
Which major and minor keys have no sharps or flats apex?
9966 [12]
C major and A minor have no sharps or flats.
5 0
3 years ago
Read 2 more answers
1. What does the term 'in season' mean?
yKpoI14uk [10]
Available at the time of year.
8 0
2 years ago
Read 2 more answers
How many bits are required to encode an image that is 25 pixels wide and 50 pixels tall, if you encode each pixel with 12 bits o
AURORKA [14]

Just multiply all numbers to get the total number of bits:

25*50*12 = 15000 bits.

3 0
3 years ago
How did<br> technological artifacts evolved over time?
adell [148]
With helping us communicate with each other and around the world with the internet and other different types of things like,Tesla’s,phones,touch screen IPads,even having a built in TV plane
3 0
2 years ago
Other questions:
  • Consider the following declaration: double[] sales = new double[50]; int j; Which of the following correctly initializes all the
    11·1 answer
  • Which ipv6 prefix will the typical enterprise network receive from the service provider?
    12·1 answer
  • How to search for the largest files on my computer vista?
    5·1 answer
  • How are clustering and Network Load Balancing similar?
    13·1 answer
  • Charles Mott works for a company called VeriSign that acts a trusted third party to verify information. One of Charles' largest
    15·1 answer
  • Careers in information technology deal with
    12·2 answers
  • Can you give an example of mail merge (letter) pls​​
    6·1 answer
  • A good CRM should Integrate marketing, sales, and customer support activities measuring and evaluating the process of knowledge
    13·1 answer
  • If an occupation is projected to decline by 7% over the next 10 years, how would you rate the job outlook? (6 points)
    14·1 answer
  • Hyperlink is a term used to refer to the specific manner of specifying the address of a website. Write reason for true or false.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!