1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
notka56 [123]
3 years ago
11

Marilyn needs help exporting her spreadsheet as a few different types of files. She needs to know exactly how her file should be

prepared in order to build the new file types as best as possible. However, she cannot remember the names or extensions of the file types, and she does not have Internet access at the moment. Therefore, she would like to browse through topics rather than entering search terms on the web.
What should Marilyn do to get the kind of help she needs?
Computers and Technology
1 answer:
sammy [17]3 years ago
5 0
She could try using help topics that could link to saving on other formats.
<span>Without the use of the internet, a computer Microsoft user can click F1 (to open help)>(choose) import or export text. Follow the procedures as stated and try to carefully use it to have the needed output.</span>
You might be interested in
Does Buzz or APEX shows all your due assignments on the left of the main home screen?
Sergeeva-Olga [200]

Answer:

go to your dashboard and press the number under grade to date (your percentage in the class) and it should show all your assignments that you have done and that still need to be done

3 0
3 years ago
What are three ways to call attention to the text on a web page?
Lesechka [4]

Answer:

Place it in a box, <u>underline</u> it, make it bold, and/or i<em>talicize</em> it, you could also make it larger.

  • You could make it a bulleted list
  1. Or a numbered list

<u>The possibilities are endless!</u>

3 0
4 years ago
Read 2 more answers
• What is the difference between primary storage, secondary storage, and off-line storage
sergiy2304 [10]


Primary storage refers to your RAM it is internal storage.

Secondary storage is any storage that is not the primary storage that permanently stores data. Examples are hard drive, tape disk drive, floppy disk drive  and compact disk drive. 

Off-line storage refers to any device that stores data that is not permanently attached to the computer. Example flash drives, The data remains on the storage device and can be connected to a different computer. 

3 0
4 years ago
Note oj cyber security​
dybincka [34]

Answer:

The answer to this question is given below in this explanation section.

Explanation:

                               "cyber security"

cyber security refers to the body of technologies,Processes and practices designed to protect networks,devices,programs and data from attack,damage or unauthorized  access.Cyber security may also be referred to as information technology security.

Importance:

                         Cyber security is important because government financial and medical organization collect process and store unprecedented amounts of data on computer and other devices.A significant portion of that data can be sensitive information,whether that be intellectual property financial data personal information or other type of data for which unauthorized access or exposure could have negative consequences.organizations transmit sensitive data across network and to other devices in the course of doing business,and cyber security describes the discipline dedicated to protecting that information and the systems  use to process or store it.

Challenges of cyber security:

                  For an effective cyber security an organization needs to coordinates its effort throughout its entire information systems.Elements of cyber components all the following:

  • Network security
  • Application security
  • Endpoint security
  • Data security
  • Identity management
  • Database and infrastructure security
  • cloud security
  • Mobile security

Managing cyber security:

            The national cyber security alliance,through recommends a top down  approach to cyber security in which corporate management leads the change in prioritizing cyber security management across all business practices. NCSA advises that companies must be prepaid to response to the inevitable cyber incident restore normal operations,and ensure that company assets and the company reputation are protected.

7 0
3 years ago
What are issues to consider when deciding to build software in-house or purchase commercial off-the-shelf software (cots)?
Scrat [10]
<span>On the computer there are always issues. For a developer to sit all day in front of a google that always invents things and the flashy images that disrupt everything. Googling on facebook is also an issue. Youtube, everything that contain flashy image is quite disruptive. If you think about content, maybe googling is less inventive. In a way it's nicer to buy applications but if you finally think of building it, there are always nicer ways of spending time. I prefer to go to seaside when I can.</span>
7 0
4 years ago
Other questions:
  • In a(n) __________ situation, a wireless device is configured to appear to be a legitimate access point, enabling the operator t
    14·1 answer
  • The exercise instructions here are long -- please read them all carefully. If you see an internal scrollbar to the right of thes
    15·1 answer
  • Dayla is concerned about managing her digital footprint. What does she mean by this? *
    7·1 answer
  • What is text box and label control​
    10·2 answers
  • You make an online purchase of a hooded sweatshirt with the logo of the Dallas Cowboys. The next time you log on, your screen ha
    13·1 answer
  • Aside from human user types, there are non human user groups. Known as account types, __________ are implemented by the system t
    10·1 answer
  • It is where your cpu (processor) is installed
    10·2 answers
  • 7 steps in infographic design​
    6·1 answer
  • How would you delete a slide from your presentation after selecting it?
    14·1 answer
  • A multiprocessor with 10 processors has 36 attached tape drives. A number of jobs have been submitted to the system where each j
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!