1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PIT_PIT [208]
4 years ago
6

Which statement correctly compares Word Online and Word?

Computers and Technology
2 answers:
Morgarella [4.7K]4 years ago
6 0
Both can be used for saving documents
denpristay [2]4 years ago
6 0

Answer:

the answer is C

Explanation:

You might be interested in
What else needs to be done when creating a site?
SSSSS [86.1K]
When you are creating a website, you will usually need to add details to the website. If you're coding a website as HTML, you always have to make sure your code is correct. If one thing is a mess up, you have to start the whole thing all over again. 
5 0
3 years ago
What is the difference between "What I ought to do?" and "What kind of person should I be"?
Luba_88 [7]

Answer:

It is the Virtue ethics. When we say what I ought to do then we mean what is the correct thing to do at that time. However, when we say what kind of person should I be, it means what is correct for our own sake. The decision we take in this case can be good as well as bad, and it is according to our own sake. However, when we say ought to, we mean deeper. and that is what is correct at that instant.

Explanation:

Please check the answer section.

8 0
3 years ago
An example of phishing is: Select one: a. flooding a web server with thousands of requests for service. b. setting up a fake med
tigry1 [53]

Answer:

Option(b) is the correct answer to the given question.

Explanation:

The main objective of the Phishing to posing as a legitimate entity and trick the individuals to sharing her confidential information like information of banking details such as credit card number  and passwords etc.

Phishing is done with the help of email, telephone or etc. Sometime phishing is done by the web page and stolen the website password. Phishing provides financial loss to the individual as well as the organization.

Except for option(b) all the options are not examples of Phishing that's why they are incorrect Options.

7 0
4 years ago
Read 2 more answers
From the perspective of the prosecution, the safest legal means of obtaining incriminating documents from a suspect is by: a. Su
never [62]

Answer:

a. Subpoena duces tectum

Explanation:

<u>Options C </u>(an informant steal the documents)<u> and D</u> (discrete copy of the documents) <u>would be considered illegal and/or inadmissible in most places</u>, so you should avoid these.

Options A (subpoena) and B (search warrant) are usually issued by a judge after considerations, so they are both legal ways to obtain something.

In a subpoena duces tecum, the court orders an individual (or a moral person) to produce (usually very specific) documents to court or face penalty.

<u>A search warrant is executed by law enforcement officials who are seeking information to help in their investigation</u>, usually not highly specific (not 'search for a copy of the April 10 minutes of the meeting.').

3 0
4 years ago
Which button will add an envelope to a document, ensuring that the document and envelope both print together?
kati45 [8]
<span>This is a simple question if we look at the options A. this is only logical answer as this button adds envelop in document so that both document and envelop print together B. This is used to remove or omit C. It shows other options for user D. It adds some chard or anoter thing in the document</span>
8 0
3 years ago
Other questions:
  • An objective test or measurement that technology product evaluators use to compare two or more products is ____.
    12·1 answer
  • If the value of the expression,
    13·1 answer
  • Within a email address Wat is the Domain
    15·2 answers
  • A virus or worm can have a payload that installs a(n) __________ door or trap-door component in a system, which allows the attac
    14·2 answers
  • It is ok to sell services on Xbox in exchange for real-world money
    10·2 answers
  • What type of data would a RDBMS store in a linked list, two-way linked list, or B-trees? What are the advantages and disadvantag
    5·1 answer
  • Which of the following is an object such as a field which can be inserted into a document
    7·1 answer
  • Reverse Word Order: Write a program that reverses the order of the words in a given sentence. This program requires reversing th
    15·1 answer
  • Hello can you please help with this if you want to thank you!
    15·2 answers
  • Choose the term described. : a value that can be passed to a function
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!