1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ycow [4]
4 years ago
15

Importance of word processing application​

Computers and Technology
1 answer:
alina1380 [7]4 years ago
8 0

Answer:

Some of the functions of word processing software include: Creating, editing, saving and printing documents. Copying, pasting, moving and deleting text within a document. Formatting text, such as font type, bolding, underlining or italicizing.

Explanation:

You might be interested in
What should the timing of transition slides be per minute?
PolarNik [594]

How Many Slides to Use in a Presentation and for how long?

In the past if you asked a presentation skills “pundit” you were likely to hear “one slide per minute,” but times are changing and I don’t think the answer is as simple as a certain number of slides per minute. A presentation slide is supposed to be on for 15 seconds and stop to ask if anyone has any questions, if you are explaining something or reading alond with the slide it could be as long as you want it to be.

5 0
3 years ago
Read 2 more answers
Which statement regarding socializers is true?
allochka39001 [22]

Answer:

The answer is: they are comparable to suit of hearts

Explanation:

The answer is: they are comparable to suit of hearts

7 0
3 years ago
Read 2 more answers
Select all the correct answers.
TEA [102]

Answer:

comlleting novice-level certifications working on one

4 0
3 years ago
When driving, your attention is __________.
maks197457 [2]
It is c hope I helped
7 0
3 years ago
Read 2 more answers
__________is threatening to steal or actually stealing information from a company and then demanding payment to not use or relea
Ludmilka [50]

Answer: 3) Information extortion

Explanation:

Information extortion is defined as the technique through which a person tends to steal and hold the confidential and important information with theirself and then demand ransom for returning it.

  • Releasing information to corrupt and attacking sources can be a consequence if the demand or condition is not fulfilled by the authorized party or person.
  • Other options are incorrect because espionage is spying military information.Competitive intelligence is used for managing strategic plans.Intellectual property is created through mind power.
  • Thus, the correct option is option(3).
5 0
3 years ago
Other questions:
  • Which osi reference model layer includes all programs on a computer that interact with the network?
    13·1 answer
  • What financial behaviors will typically lead to a low credit score?
    14·1 answer
  • What does this say:<br> √ans
    6·2 answers
  • _____ is a program that allows a person using one computer to access files and run programs on a second computer that is connect
    11·1 answer
  • You are adding a new 500 GB hard drive to your computer. The hard drive must be formatted with a file system to organize files i
    8·1 answer
  • Use the drop-down menus to complete each sentence about the layers of the atmosphere.
    14·2 answers
  • How do assignment article computer security, ethics and privacy?
    15·1 answer
  • Jimmy has been issued a citation for littering in a city park. When Jimmy
    8·1 answer
  • Write a program, TwoDimentionalGrid. Ask the user to enter the size of the 2 dimensional array. Here we are not doing any input
    13·1 answer
  • Help me. thank you very much
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!