1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Molodets [167]
3 years ago
9

William wants to create a document using a DTP what time saving techniques can he use?

Computers and Technology
1 answer:
mote1985 [20]3 years ago
6 0

Answer:

A Master Page & a Style Sheet

Explanation:

You might be interested in
How do you get free Wifi on your phone without paying
Monica [59]
The library offers free wifi. I don’t think you can get free Wifi without paying(unless you go somewhere that offers free wifi). I don’t recommend you hacking into people’s Wifi(you can go to jail).
6 0
3 years ago
Operating systems move code and data, as necessary, to a portion of the disk that is used as if it were memory, not just disk st
GalinKa [24]

Virtual memory frees up RAM by transferring data that hasn't recently been used to a storage device, such as a hard disk or solid-state drive (SSD). Virtual memory is useful for multitasking, running large programs, and speeding up the system.

<h3>What is the role of virtual memory in disk storage space?</h3>

Virtual memory fulfills two functions. First, by using disk, it enables us to increase the utilization of physical memory. Because each virtual address is converted to a physical address, it also enables memory protection.

An operating system may load programs larger than its physical memory thanks to virtual memory, which is its fundamental benefit. The users get the idea that the machine has boundless memory. Additionally, it offers memory security.

Therefore, operating systems move code and data, as necessary, to a portion of the disk that is used as if it were memory, not just disk storage space.

Learn more about virtual memory here:

brainly.com/question/13384907

#SPJ2

4 0
1 year ago
Read 2 more answers
COMO HA SIDO LA INNOVACION DE ESTE OBJETO TECNOLOGICO DURANTE SU EVOLUCIÓN
Marizza181 [45]

Answer:

Cual es el objeto tecnologico?

Explanation:

Si dices Cual,puede ser que te ayude.

3 0
3 years ago
Which activities below might have a negative effect on your online reputation?
Zepler [3.9K]

Answer:

I believe the last 2 maybe even the one above the second to last answer

Explanation:

3 0
3 years ago
Which of the following is a subsystem of computers providing access to the Internet and offering multimedia and linking capabili
lbvjy [14]
Answer is option C that is w.w.w.
6 0
3 years ago
Other questions:
  • 1. _______ is when two things happen at one time when using the Scratch program.
    6·1 answer
  • In the windows firewall, any rules preceded by a __________ checkmark have not been enabled. black gray green red
    13·1 answer
  • Help please brainliest
    8·1 answer
  • Universal Containers is implementing a community of High-Volume Community users. Community users should be able to see records a
    12·1 answer
  • Betrand Meyer developed the ______ programming language which is not type-safe because it violates the law of contravariance.
    9·1 answer
  • Downloading files is safe for most types of files except Select one: a. documents. b. pictures. c. executable files. d. music fi
    7·1 answer
  • ​open-source software is​ ________.
    11·1 answer
  • Computer privacy typically occurs when which of the following is violated?
    6·1 answer
  • 100 tickets are sold in a raffle with one prize. John has 8 tickets, Jamie has 10 tickets, find the probability that John wins
    11·2 answers
  • My father helps me more than helping my sister in Maths because I need more help to understand. This situation shows ___________
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!