1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Molodets [167]
3 years ago
9

William wants to create a document using a DTP what time saving techniques can he use?

Computers and Technology
1 answer:
mote1985 [20]3 years ago
6 0

Answer:

A Master Page & a Style Sheet

Explanation:

You might be interested in
What are the advantages of the java.util.Stack implementation of a stack?
klemol [59]

Explanation:

The advantages of java.util.Stack are as following:-

  1. java.util.Stack is an implementation of the vector class hence it can keep track of position of elements in the stack hence it is not required to store an additional pointer for each node.
  2. In the implementation it allocates space only that much is needed.

These are the two advantages of java.util.Stack.

3 0
3 years ago
ShowDialog, used by a FileDialog object to display itself, is ______________________.
emmasim [6.3K]

Answer: A method

Explanation:

 The show Dialog is the type of method that is used by the file-dialog object for displaying itself. The main purpose of show-dialog is that it runs the common dialog box in the system with the default owner. It is basically inherited from the common-dialog.

The show-dialog is the type of method that displays the dialog box for defining the file extension filter and the various dialog behavior in the system.

 

8 0
3 years ago
a) In an office, it is required to take hundreds of copies of the same type written document. Which traditional method of docume
olga2289 [7]

Answer:

I don't know

Explanation:

3 0
2 years ago
Consider the following list.list = {24, 20, 10, 75, 70, 18, 60, 35}Suppose that list is sorted using the selection sort algorith
DochEvi [55]

Answer:

list = {10, 18, 24, 75, 70, 20, 60, 35}

Explanation:

In selection sort 1st element of array is compared with all elements in list. If there is any element smaller than any other element in the list,  that will be swap with first element as

1st iteration:

in given list first element is 24, this will compare with whole list and find the number that is smaller than any other element in list. there 10 is smallest element in the list so in first iteration the list is given as:

list = {10 , 20, 24, 75, 70, 18, 60 ,35}

2nd Iteration:

After first iteration the smallest element of list will comes at first position. Now we start with 2nd position of list. 2nd element of the list will be compared with all other elements except 1st element. The 2nd smallest element of the list will be replaced with 2nd element of array.

In 2nd iteration, 18 is 2nd smallest element in the list so that will be swap with 2nd element of list. now the list is given as after

list = {10, 18, 24, 75, 70, 20, 60, 35}

5 0
3 years ago
What will the following program display in the console?
irga5000 [103]

It will display the numbers 0 through 3, each on a separate console line.

4 0
3 years ago
Read 2 more answers
Other questions:
  • While in slide show mode, if you are not careful you can close the application by clicking the x on the menu bar. question 38 op
    12·2 answers
  • Renee is creating a multimedia presentation for a website that requires user interaction. Which multimedia type is Renee using?
    5·2 answers
  • Where does a computer store it’s information
    11·1 answer
  • 1. In Access, a template is which of the following? a. A database to manage contacts b. Where a database is stored c. Two tables
    5·1 answer
  • One method of encoding messages is known as the "expanding square code". this method encodes message by placing the character of
    10·1 answer
  • You want to equip yourself with FRUs for a laptop. What would you take with you? (Choose two)A. RAMB. SD card readerC. Video car
    10·1 answer
  • What specific authentication method has no encryption for user credentials or data, and is not recommended for most applications
    14·1 answer
  • In a networking context, "architecture" refers to
    5·1 answer
  • The Syntax NPV formula includes the Rate, The Cash Flows, the number of payments, and the Future
    12·1 answer
  • Neview of related literature happens in two wayo (1) Traditional and
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!