1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sliva [168]
3 years ago
9

Which of the following statements about the use of desktop publishing software is true? A. There's no visible difference between

pages produced by word processing and desktop publishing software. B. Most publishers prefer to use their desktop publishing software as their main word processor. C. Today's professional-strength word processing programs can do everything high-end desktop publishing software can. D. Most desktop publishers prefer to create the text portion of their documents in a word processing program and import the text into a desktop publishing file.
Computers and Technology
1 answer:
xxTIMURxx [149]3 years ago
8 0
The correct answer to the question is option D.

A good number of desktop publishers would rather create the text portion of their documents using a word processing program, and then import the text into a desktop publishing file. Thankfully, w<span>ord processing programs are compatible with desktop publishing and other software programs.</span>
You might be interested in
Discovery of a vulnerability in a software program can potentially be sold to the government. Group of answer choices True False
enyata [817]

Discovery of any vulnerability in a software program can potentially be sold to the government: True.

<h3>What is vulnerability?</h3>

Vulnerability is any form of weakness, flaw or defect that is found in a software application, computer system, or network, which can be exploited by an attacker (hacker), in order to gain an unauthorized access and privileges to sensitive user data that are stored in a computer system.

This ultimately implies that, a vulnerability in a software application can potentially be sold to the government, so as to avert and mitigate any form of unauthorized access and privileges to sensitive user data.

Read more on vulnerability here: brainly.com/question/25813524

#SPJ1

4 0
2 years ago
The average numbers of shares a piece of content receives is known as its:
tino4ka555 [31]

Answer:

Amplification.

Explanation:

Social media publishing can be defined as a service that avails end users the ability to create or upload web contents in either textual, audio or video format in order to make them appealing to a target audience.

Thus, these web contents are generally accessed by end users from time to time through the use of various network-based devices. As users access these contents, they're presented with the option of sharing a particular content with several other people a number of times without any form of limitation.

Hence, the average numbers of shares a piece of content receives is known as its amplification. The higher the average numbers of shares a particular content receives, the higher the number of traffic it generates for its publisher.

3 0
3 years ago
2.
Masja [62]

Answer:

is this a question or not?

6 0
3 years ago
________ refers to the ability to model components and show how the components' inputs and outputs relate to one another.
Black_prince [1.1K]

Answer:

Central Processing Unit

Explanation:

When the CPU puts the address of a peripheral onto the address bus, the input–output interface decodes the address and identifies the unique computer peripheral with which a data transfer operation is to be executed.

5 0
3 years ago
_____ is confirming the significance of what another person is feeling.
il63 [147K]

Validation: Understanding and showing acceptance for another person                

4 0
3 years ago
Read 2 more answers
Other questions:
  • An operating system cannot run from an external drive. true or false
    15·1 answer
  • What is a bug?
    11·2 answers
  • Types of operating systems
    5·2 answers
  • What is the value of length after the code that follows is executed?int[][] nums = { new int [] {1, 2, 3},new int [] {3, 4, 5, 6
    8·1 answer
  • Tree diagrams are useful for
    12·1 answer
  • Explain why it is not necessary for a program to Explain why it is not necessary for a program to be completely free of defects
    13·1 answer
  • If all the data in a database is not physically located in one place, it would be a(n _______ database.
    5·1 answer
  • How do I create a powershell script to make a Windows user account that is a non-admin user
    7·1 answer
  • KAPWING Video Editing Software allows you to use existing You Tube Videos in your design.
    8·1 answer
  • Write A Code In Python
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!