1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zalisa [80]
3 years ago
8

Which of the following is not considered format?

Computers and Technology
2 answers:
aalyn [17]3 years ago
8 0
Ordering of information
GalinKa [24]3 years ago
6 0
The answer is indeed the last one, ordering information and let me say it is true because this describes a function in itself and not a format like the first option that is a text format, the second a visual format and the third could be a table format. I hope this clarifies things
You might be interested in
What is the current DoD repository for sharing security authorization packages and risk assessment data with Authorizing officia
Tems11 [23]

Answer:

The answer is "Army Portfolio Management System".

Explanation:

The Army Way to solve Information-Technology (APMS-AITR) portfolio management registration for IT investment, IT capacity, and IT software was its single legal army registry.

Its main goal of IM/IT Management Of working capital and Corporate Finance is to prioritize IM/IT expenditure by evaluating and handling TRADOC as just an investment portfolio. The APMS was its main decision supporting instrument for military portfolio management.

8 0
3 years ago
A relational database has been created to store data about subjects that students are studying. The following is a
12345 [234]

Mention two charactarestics of money that make it a sustainable medium of exchange

7 0
3 years ago
In what ways are computers being used to improve our quality of life
Helga [31]

Answer:

  • computers help with our education system
  • communicating with others is easier (emails/text messages opposed to sending an envelope)
  • technological advances

5 0
3 years ago
Read 2 more answers
Where would you go to access frequently used icons?
trapecia [35]

Answer:

b

Explanation:

4 0
3 years ago
Read 2 more answers
List 2 positive impacts of cybersecurity.
kupik [55]

Answer:

Protection for your business and Increased productivity

Explanation:

This is because it ensures your employees aren't at risk from potential threats and, since there no virus, the computers will work well (not slow down)

7 0
3 years ago
Read 2 more answers
Other questions:
  • Why should spain go to Africa ​
    15·1 answer
  • How is the numeric string that makes up a digital signature created?
    5·1 answer
  • Assume that the myname.txt file is currently closed. write the code segment that opens the file without erasing it, write anothe
    13·1 answer
  • Consider this data sequence: "3 11 5 5 5 2 4 6 6 7 3 -8". Any value that is the same as the immediately preceding value is consi
    6·1 answer
  • As with most professions, photography comes with its own unique set of terms and jargon. Identify at least four different words
    5·1 answer
  • Professor Gig A. Byte needs to store text made up of the characters A with frequency 6, B with frequency 2, C with frequency 3,
    10·1 answer
  • Which of these stamtemnst correctly descride how to adjust a imange on a slide
    8·1 answer
  • When your grounded and the only thing you can get on is a computer........................oh welllllllllllllllllllllllllllllllll
    7·1 answer
  • You are having difficulty changing permissions for a folder on an NTFS volume that was created by another user. How can you best
    6·1 answer
  • What is folded card publishing?​
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!