1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lutik1710 [3]
3 years ago
7

Marie has never used a word processor. In 3 to 4 sentences, describe how she could benefit from using a word processor to comple

te school writing assignments.
Computers and Technology
2 answers:
Aliun [14]3 years ago
7 0

Answer:

She could be able to present her information in a legible way. She will be able to type quicker than writing, and be more thorough about her writing. She can also benefit by becoming more familiar with different technologies. She can benefit by being able to add information that broadens her knowledge on the subject.

Explanation:

pychu [463]3 years ago
6 0
She could be able to present her information in a legible way. She will be able to type quicker than writing, and be more thorough about her writing. She can also benefit by becoming more familiar with different technologies. She can benefit by being able to add information that broadens her knowledge on the subject.

Hope this helps!!
You might be interested in
A reflective cross-site scripting attack (like the one in this lab) is a __________ attack in which all input shows output on th
Murrr4er [49]

Answer:

" Non-persistent" is the right response.

Explanation:

  • A cross-site category of screenplay whereby harmful material would have to include a transaction to have been transmitted to that same web application or user's device is a Non-persistent attack.
  • Developers can upload profiles with publicly available information via social media platforms or virtual communication or interaction.
6 0
3 years ago
What is and effective way to display calculation in a word document?
Tju [1.3M]
You only put a numerical expression in  numbers if it is over 100, it the calculation correctly.
<span />
8 0
4 years ago
To narrow the search for consumers, search engines used to measure the relevance of a website or an information page by counting
noname [10]
The answer is : it was easily manipulated.   To narrow the search for consumers, search engines used to measure the relevance of a website or an information page by counting the number of times the searched words appeared on that web page or document.  They don't use this criterion anymore because it was easily manipulated.
5 0
3 years ago
Taking multiple cells in a spreadsheet and combining them into one large cell is referred to as
lyudmila [28]
Cell merging or just merging
6 0
3 years ago
Read 2 more answers
Explain the development, design and implementation aspects of algorithms in the development of software.
shtirl [24]

Explanation:

Phases of software development are ;

1. Requirements analysis

2.Domain analysis

3.Client-oriented design

4.Implementation-oriented design

5.Implementation

6.Integration

7.Packaging.

Ongoing Activities in Software Development

1. Risk analysis

2. Planning

3.Verification

4.Documentation

8 0
3 years ago
Other questions:
  • Microsoft Surface can do all of the following except ______.
    12·2 answers
  • On the UB-04 claim form, the type of bill is identified by a four-digit numerical code. The first digit is a leading zero, what
    10·1 answer
  • Program planning for the best may include therapy, effective discipline strategies, crisis treatment, and/or family counseling.
    9·2 answers
  • Which key removes all data from an active cell with one click? A. Esc B. Delete C. Tab D. F2
    9·2 answers
  • What is the relationship between IaaS and TCP/IP and network services?
    10·2 answers
  • Which statement about muzzleloaders is true? All muzzleloaders are rifles. All muzzleloaders have only one barrel. Muzzleloaders
    12·1 answer
  • Me Completan Pliiiis
    11·1 answer
  • A Task can be created in Outlook 2016 by clicking on the Tasks navigation item, or by
    5·2 answers
  • Difference between the four generations of computers in a tabular form​
    8·1 answer
  • software that opens files and scans their code to look for certain types of malware is known as software.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!