1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alina1380 [7]
3 years ago
12

Select the correct answer.

Computers and Technology
2 answers:
Sladkaya [172]3 years ago
5 0

Answer:

B

Explanation:

hes not presenting, word processing or making spreadsheets and multimedia software can be used to make music

cricket20 [7]3 years ago
3 0
Answer: A. presentation software
You might be interested in
What is not true of efs
Lemur [1.5K]

Answer:

EFS cannot store files encrypted.

Explanation:

EFS) is a feature introduced in version 3.0 of NTFS that provides filesystem-level encryption. EFS is useful for mobile computer users, whose computer are subject to physical theft, and for storing highly sensitive data. Encryption itself is the method where the information is converted into secret code that hides the information's true meaning. (EFS) is used to encrypt files and folders. EFS is easy to use, with nothing more than a check box in a file’s properties. It is not fully supported on Windows 7 Starter, Windows 7 Home Basic, and Windows 7 Home Premium!

3 0
3 years ago
Nadia's productivity at work is being hurt due to the large quantity of unwanted e-mail she receives. What steps can she take to
anastassius [24]

Answer:

Hi,

The best option in the list is <u>stop posting her e-mail address on newsgroups.</u>

Explanation:

Unwanted e-mail is categorized as a spam email.These emails can not be entirely avoided because we use the Internet thus it is recommended that you filter them.A program called my email client can help to filter spam though in some cases, it might not be effective.

The techniques Nadia can employ in this case is to hidden her email address when visiting newsgroups.News groups are forums online where people discuss certain topic.Avoid publishing the email in these web sites can hide her tackle this problem. Additionally, Nadia could train the filter serach feature in her email box through repoting such emails using the report button present, avoid responding/openning spam  or use a third party program to track spam emails and block them.

Wish you Luck!

8 0
3 years ago
_____ refers to unsolicited commercial emails, usually sent to a large number of people with little regard to the users interest
frozen [14]
Spam refers to large unsolicited email irregardless of the recipients views on the matter
5 0
3 years ago
Draw the 2-3 tree that results when you insert the keys E A S Y Q U T I O N in that order into an initially empty tree
mr_godi [17]

Answer:

If its any easy question, answer it yourself.

Explanation:

:)

6 0
2 years ago
_______ allows you to add formatting such as shapes and colors to text. a. worddraw b. wordart c. worddesign d. wordshapes
4vir4ik [10]
Word Design is the answer.
4 0
3 years ago
Read 2 more answers
Other questions:
  • Help!!!!!!!!!!!!!!!!!!!
    12·1 answer
  • Which of these statements makes the most sense? a folder is contained within a file. a file is contained within a folder. a driv
    9·2 answers
  • In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will
    8·1 answer
  • A(n) _____ can replace many applications with one unified set of programs, making the system easier to use and more effective.
    8·1 answer
  • How to be good at photography?
    5·2 answers
  • Variable-length entities. fixed-length entities. data structures that contain up to 10 related data items. used to draw a sequen
    14·1 answer
  • Write a function definition for a function which takes one parameter and returns twice that parameter
    12·1 answer
  • The memory used by the CPU to temporarily hold data while processing is called what?
    11·1 answer
  • What ethical concerns might arise from applying new IT to law enforcement?
    5·1 answer
  • Multiple Select Which of these are ways a hacker might learn someone's password? Select 3 options. o social engineering keylogge
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!