1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Illusion [34]
2 years ago
5

Name the different views in word​

Computers and Technology
1 answer:
svlad2 [7]2 years ago
4 0

Answer:

Print Layout, Full-Screen Reading, Web Layout, Outline, and Draft are 5 different views in Word.

Hope this helps!

You might be interested in
How important "saving" in every individual?​
photoshop1234 [79]

Answer:

The importance of saving money is simple: It allows you to enjoy greater security in your life. If you have cash set aside for emergencies, you have a fallback should something unexpected happen. And, if you have savings set aside for discretionary expenses, you may be able to take risks or try new things.

4 0
2 years ago
Determine the best access modifier for each of the following situations: a. A class Employee records the name, address, salary,
Lorico [155]

Answer:

a. Protected

b. Public

Explanation:

There are four acess modifier in Java.

Default: Acessible only within the same package.

Public: Can be acessed by any class.

Private: Acessible only within the class.

For example, you have a class employee and a private method. This method can only be accessed by an object that is an instance of an employee.

Protected: Used in classes that extend each other. For example, a class of employees would extend employee.

So:

a. A class Employee records the name, address, salary, and phone number.

The best acesses modifier is protected. A class may extended employee but have the same arguments(name, adress, salary, phone number), so it should also have acess to the method.

b. An adding method inside of a class BasicMath.

This method can be used in a variety of packages and projects and classes... and there is no important information regarding security. So the best method is public.

4 0
2 years ago
How ICT has helped education to grow through progression?
Vsevolod [243]

Answer:

Hey there!

Explanation:

This is ur answer...

<em>ICTs can enhance the quality of education in several ways: by increasing learner motivation and engagement, by facilitating the acquisition of basic skills, and by enhancing teacher training. ICTs are also transformational tools which, when used appropriately, can promote the shift to a learner-centered </em><em>environment.</em>

Hope it helps!

Brainliest pls!

Have a good day!^^

6 0
1 year ago
Prove the following assertion: For every game tree, the utility obtained by MAX using minimax decisions against a suboptimal MIN
TiliK225 [7]

Answer:

From the given diagram, consider a MIN node whose children are terminal nodes, if MIN plays  

suboptimal. MIN will never be lower than the utility obtained playing against an optimal MIN  

MIN will always select a move having minimax utility greater than or equal to the move that is  

predicted by the minimax that is the MIN-played optimal value.  

Then the MIN node's value is increased to MAX. This is done by induction.  

One can do better than the minimax strategy, if the suboptimal play is predicted by MIN.

If MIN always falls for certain for certain kind of trap and losses, then setting up a trap guarantees a win.

Explanation:

See attached picture also.

5 0
3 years ago
Suppose during a TCP connection between A and B, B acting as a TCP receiver, sometimes discards segments received out of sequenc
Shalnov [3]

Answer:

Yes

Explanation:

We known that TCP is the connection \text{oriented} protocol. So the TCP expects for the target host to acknowledge or to check that the \text{communication} session has been established or not.

Also the End stations that is running reliable protocols will be working together in order to verify transmission of data so as to ensure the accuracy and the integrity of the data. Hence it is reliable and so the data can be sent A will still be delivered reliably and it is in-sequence at B.

4 0
2 years ago
Other questions:
  • What item on a business card is generally the most prominent?
    13·2 answers
  • Audacity functions with a computer that has a minimum of ______ of RAM and a 300 MHz processor.
    12·2 answers
  • In order to allow communication between vlans for exchange of data what must be used?​
    15·1 answer
  • Everyone’s favorite speedy blue hedgehog recently returned to his 2D origins in a critically acclaimed side-scrolling game. What
    8·2 answers
  • The idea generating technique most often used in writing business letter is ?
    9·2 answers
  • Mathematical expression that might link numbers in cells
    14·1 answer
  • Which term means a device that converts one voltage to another?
    13·1 answer
  • Help fast fast anyone
    10·1 answer
  • The following pieces are known as (image shown above)
    15·2 answers
  • How many 2/8 pound patties can she make from 7/8 of a pound of hamburger
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!