1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alika [10]
4 years ago
13

NEEEEEEEEEEEEEEEEEEEEEEEEEEED HELP PLZ HURRYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYY

Computers and Technology
1 answer:
AveGali [126]4 years ago
7 0

Answer:

The first step after selecting the File tab is to select <u>New</u>

Explanation:

Invoice templates are used in order to streamline the billing in business.

In order to use such templates by fetching them online such as from Office.com following steps should be followed:

  • Start the Microsoft Word software.
  • Click on File tab.
  • From the drop down memory choose New.
  • In the Search menu type Invoices and it will display all available templates of Invoices.
  • On the homepage, their will be be an option for More Templates below the available ones. Click on it and choose the Category from left and click Invoices.
  • Select the template you want to use.

<h3>I hope it will help you!</h3>
You might be interested in
g Fill the validateForm function to check that the phone number is 10 characters long and that the user name is less than 11 cha
Rom4ik [11]

Answer:

function validateForm(event)

{

event.preventDefault();

var phoneNumber = form.phoneNumber.value;

var userName = form.userName.value;

if(phoneNumber.length!=10)

console.log("Phone Number is Invalid");

if(userName.length<11)

console.log("User Name is Invalid"); }

8 0
3 years ago
The _____ model of a systems development life cycle provides for progressive development of operational software, with each rele
dimaraw [331]

Answer:

B. Incremental Build life cycle

Explanation:

RAD life cycle: RAD model of software development life cycle is all about coming up with prototype as soon as possible. It describes a method of software development which heavily emphasizes rapid prototyping and iterative delivery.

Incremental build life cycle: In incremental build model of software development life cycle, each release of the software have added capabilities. The development is finished when the user is okay with the present features. Focus is put on creating a working prototype first and adding features in the development life cycle. This is the correct option.

Waterfall life cycle: In a waterfall model, each phase must be completed fully before the next phase can begin and this usually takes time before a working software can be released. There is also no overlapping in the phases.

Spiral life cycle: Spiral Model can be pretty costly to use and doesn't work well for small projects. It's a risk-driven model which means that the overall success of a project highly depends on the risks analysis phase.

4 0
3 years ago
Read 2 more answers
True / False<br> 1. A byte is a standardized unit of measure that is always 8-bits.
Anna11 [10]

Answer:

TRUE

Explanation:

In telecommunication and computing, there are different units of data storage. The most commonly used units are the bit and the byte.

A bit is the capacity of the system having only two states.

Whereas, the byte, also known as octet, is equal to eight bits. The unit symbol for Byte is B. In many computers, it is the smallest addressable unit of memory.

Therefore, <u>the given statement is TRUE</u>.

6 0
4 years ago
All of the following are U.S.-EU data privacy requirements except:
Montano1993 [528]

Answer:

b. Redundant hardware and data backup systems

Explanation:

Data privacy is important where a company collects, processes and stores personal information.In the US-EU have laid down regulations to ensure data privacy is maintained. It is a requirement before collection of personal data, to clearly state why the data is being collected and how it will be used.The individuals whose data is being processed have a right to access their data at no cost during processing . Of great importance is the security of the data so as to maintain its integrity, Companies are required to take steps in protecting the data from unauthorized access, processing and accidental loss.redundant hardware and data backup system are used by companies as a fail-safe mechanism in data protection but they are not a requirement in data privacy, although they enhance it.

8 0
3 years ago
Which of the following is NOT a characteristic developed by New Journalism?
balu736 [363]

Explanation:

I think it's d.

Hope this help

7 0
3 years ago
Other questions:
  • Almost all PCs have this type of serial connector
    8·1 answer
  • Is using abbreviations and symbols in social media a problem? Why or why not?
    11·1 answer
  • Technical colleges offer certification in audio engineering through programs that are normally from 2 to 6 months long. False Tr
    14·1 answer
  • 50 POINTS &amp; A FOLLOW!
    11·2 answers
  • Which search engine do you prefer? Why
    15·2 answers
  • What do you think will happen if you use a different file format for a certain document type?
    15·1 answer
  • PLS HELP
    5·1 answer
  • This career applies mathematical and theoretical knowledge in order to compare and produce computational solutions.
    14·2 answers
  • Ian’s photography teacher asks him to take some photos of a few different species over the weekend. Which group of photos would
    12·1 answer
  • What are the five generations of computer software​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!