1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
FinnZ [79.3K]
3 years ago
14

Explain why a document created by word processing software is stored as a binary file.​

Computers and Technology
1 answer:
Savatey [412]3 years ago
3 0

Answer:

Refer below.

Explanation:

Binary DOC records regularly contain more content organizing data (just as contents and fix data) than some other document designs like Rich Text Format and Hypertext Markup Language, however are normally less broadly good.

The DOC documents made with Microsoft Word renditions contrast. Microsoft Word forms before Word 97 ("8.0") utilized an alternate organization from the OLE/CFBF-based Microsoft Word 97 – 2003.

In Microsoft Word 2007 and later, the binary document design was supplanted as the default position by the Office Open XML group, however Microsoft Word can in any case produce DOC records.

You might be interested in
Question 9<br> Any data in your Access database can be converted into labels using the
kotykmax [81]
Are there any choices
5 0
3 years ago
A machine’s ability to mimic human thinking to behave in a way that appears to be learning and solving problems is known as:
kkurt [141]

D. game mechanics D. game mechanics

7 0
3 years ago
How to upload themes to chrome web store
Advocard [28]
You need to go to the chrome web store, filter your search for themes, search what kind you are looking for, and then add the extension. 
3 0
3 years ago
What risks, threats, and vulnerabilities did you identify and assess that require immediate risk mitigation given the criticalit
olchik [2.2K]

Answer:

The risk and threat that need immediate mitigation are:

- random access to your personal computer without your permission

-  deletion of files and data

- hacking of IT infrastructure  

- uploading of file s on the social platform

- classified data can be used to blackmailing

Explanation:

Every country homeland security system work for the betterment of the citizen and thus their main concern is to provide threat and risk-free source of communication. But then also there are may serious threats that can come to one's privacy.

The risk and threat that need immediate mitigation are:

- random access to your personal computer without your permission

-  deletion of files and data

- hacking of IT infrastructure  

- uploading of file s on the social platform

- classified data can be used to blackmailing

6 0
4 years ago
When using correct ergonomic technique be sure to _____.
jeka57 [31]

Answer: The answer is C

4 0
4 years ago
Read 2 more answers
Other questions:
  • While shopping online for gardening supplies, Lana visits a website she had heard advertised on Home and Garden Television (HGTV
    5·1 answer
  • A user reports that he can't connect to a specific website. you go to the user's computer and reproduce the problem. what should
    11·1 answer
  • If a cheetah covers 155 meters in 5 seconds, at what speed is the cheetah running?
    14·2 answers
  • PLEASE HELP! Which aspect helps you to change the luminescence of your image?
    10·2 answers
  • You use worksheets to perform calculations. How do you perform these calculations? ______ are used for performing calculations i
    12·2 answers
  • Which term describes an event where a person who does not have the required clearance or access caveats comes into possession of
    15·2 answers
  • The short-term, 0-24 hours, parking fee, F, at an international airport is given by the following formula:  5, if 0 # h # 3 F5
    8·1 answer
  • I can't find the errors! Could anyone help me please?!
    5·1 answer
  • Which XXX will prompt the user to enter a value greater than 10, until a value that is greater than 10 is actually input?
    14·1 answer
  • Is computing gcse easy or hard
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!