1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Softa [21]
3 years ago
15

Help me right now!!!!!!!!!!!!!!!!!!!!!!!!11

Computers and Technology
1 answer:
PilotLPTM [1.2K]3 years ago
4 0
Word-processing software includes basic applications designed for casual business or home users and powerful, advanced applications capable of meeting the most-demanding needs of businesses. Many word-processing applications are designed for use as part of a suite or integrated group of word-processing, spreadsheet, and presentation programs
You might be interested in
1.Discuss the differences and similarities between a peer-to peer network and a client server network.
irga5000 [103]

Answer:

dsdasd1.Discuss the differences and similarities between a peer-to peer network and a client server network.

1.Discuss the differences and similarities between a peer-to peer network and a client server network.

1.Discuss the differences and similarities between a peer-to peer network and a client server network.

1.Discuss the differences and similarities between a peer-to peer network and a client server network.

1.Discuss the differences and similarities between a peer-to peer network and a client server network.

1.Discuss the differences and similarities between a peer-to peer network and a client server network.

1.Discuss the differences and similarities between a peer-to peer network and a client server network.

Explanation:

jaiusfkybuetcrjnwxyefshrcxijkwuecvashcnzx

5 0
3 years ago
I need some questions and answers in spreadsheet​
yarga [219]

Answer:

you need to show what you need help with

Explanation:

5 0
3 years ago
How does the Lossy file format reduce the file size?
beks73 [17]

The answer is c. I just took it on apex n that’s what I got lol

3 0
4 years ago
Read 2 more answers
ASAP help me I dont have enough time
umka21 [38]

Answer:third stage of parent-infant attachment

Explanation:

7 0
2 years ago
Alice posts a key for encrypting that anyone can access. Bob uses that key to encrypt a message, then sends it to Alice. When Al
UNO [17]

Answer:

Public key encryption

Explanation:

DescriptionPublic-key cryptography, or asymmetric cryptography, is a cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.

5 0
4 years ago
Other questions:
  • Which of the following is true of property?
    13·1 answer
  • The waterfall model and spiral model are variations of SDLC. Do some research to find out what they are and explain how these mo
    14·1 answer
  • Una pregunta cuales son los ataques de Sindel que por favor y me lo diga gracias
    11·1 answer
  • On five lane roadways, the center lane is designated for __________ and is used by vehicles traveling in both directions.A. Thro
    15·1 answer
  • write a c++ program that writes weather data from a file wx_data.txt to a file wx_summary for everyday of the year. also add min
    15·1 answer
  • Give two advantages of representing integers in pure binary.
    5·1 answer
  • What animal is perry the platypus ​
    6·2 answers
  • When preparing the heading for an MLA Format Academic Report, which of the following shows the proper order of the for lines of
    10·1 answer
  • What is the key to satisfaction and success when choosing a career
    15·2 answers
  • Compare the freedom available to the American media with the freedom available to media in other parts of the world. How does a
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!