1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marianna [84]
3 years ago
14

TO COMPUTING IN BUSINE

Computers and Technology
1 answer:
Diano4ka-milaya [45]3 years ago
5 0

Answer:

<em>the</em><em> </em><em>correct</em><em> </em><em>answer</em><em> </em><em>is</em><em> </em><em>a.</em><em> </em><em>Word</em><em> </em><em>processing</em><em>.</em>

Explanation:

<em><u>hope</u></em><em><u> </u></em><em><u>this</u></em><em><u> </u></em><em><u>works</u></em><em><u> </u></em><em><u>out</u></em><em><u>!</u></em><em><u>!</u></em><em><u>!</u></em><em><u>!</u></em><em><u>!</u></em>

You might be interested in
The role of ICT In government.
Nataly [62]

Answer:

ICT affects the governments by improving responsiveness, increasing efficiency and enhancing governance practices. And by letting them use their own technology.

Explanation:

tell me if it helped ^-^

4 0
1 year ago
Briefly discuss the aesthetics and ergonomics of a hydraulic jack. First explain what these
ehidna [41]

Answer:

For this model, aesthetics is defined as a measure of how attractive a product appears, and ergonomics is how well a product feels when used/held. ... Two important types of defects, part flash and crush, will be used to define ergonomic and aesthetic PA's, respectively.

5 0
2 years ago
Which of the following is not a standard view in Microsoft PowerPoint?
Luda [366]
I think the answer would be D. Sorry if i'm wrong but i'm pretty sure it is D.
6 0
2 years ago
Embedded computers usually are small and have limited hardware but enhance the capabilities of everyday devices. True or false?.
kati45 [8]

Embedded computers usually are small and have limited hardware but enhance the capabilities of everyday devices is a True statement.

<h3>Are embedded computers small?</h3>

Embedded computers are known to be machine that is said to be in smaller form  of their factor motherboards. An example is Mini-ITX .

Note that there are lot of Different forms of  embedded computers that has their specific innovative enclosure designs.

Therefore, based on the above, Embedded computers usually are small and have limited hardware but enhance the capabilities of everyday devices is a True statement.

Learn more about Embedded computers  from

brainly.com/question/9706390

#SPJ1

5 0
1 year ago
What technology uses mathematical algorithms to render information unreadable to those lacking the required key
hoa [83]

Data encryption is the name of the technology that uses mathematical algorithms to render information unreadable to those lacking the required key.

<h3>What is Data encryption technology?</h3>

This is a technology that helps to secure data by applying a technique known as cryptography. What this basically means is that a secret code (or key) is generated which would provide access to the cryptographically stored information, and failure to provide the correct key makes the data or information unreadable.

You can learn more about how data encryption works here brainly.com/question/9238983

#SPJ1

6 0
1 year ago
Other questions:
  • Add the following functions to the code:
    9·1 answer
  • Calculated fields can be entered in queries. What row should you type a calculated field in?
    13·1 answer
  • Which different supports from a part of the matte box?
    8·1 answer
  • Universal Containers is implementing a community of High-Volume Community users. Community users should be able to see records a
    12·1 answer
  • "Most of us know that when we come into a college classroom, we will see desks and chairs, a computer station and a projector. A
    6·1 answer
  • Consider the following code segment: try : inputFile = open("lyrics.txt", "r") line = inputFile.readline() print(line) _________
    6·1 answer
  • "What technology will examine the current state of a network device before allowing it can to connect to the network and force a
    13·1 answer
  • Write the definition of a function named fscopy. This function can be safely passed two fstream objects, one opened for reading,
    11·1 answer
  • Using ________ as a promotion method will bring return visitors to your site.
    8·1 answer
  • Which password attack method uses long lists of words that have been predefined and can be quickly downloaded for use to break a
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!