1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
abruzzese [7]
3 years ago
11

When Mary started college, her parents bought her a new computer that came loaded with the bare essentials in terms of software

applications. She is now looking into purchasing additional software. Mary needs word processing software for her classes, but she has to budget her resources carefully this semester. She might consider using ____.
Computers and Technology
1 answer:
Darina [25.2K]3 years ago
5 0

Answer:

office online

Explanation:

office online is a free online version of Microsoft office suite. it includes Microsoft word, Microsoft excel,  Microsoft power point, one note. It allows users to create and edit files online.

You might be interested in
Out put of Print (3**2*2)
expeople1 [14]

Answer:

18

Explanation:

please mark me as brainliest

4 0
2 years ago
Read 2 more answers
A popular encryption method used to protect data that travel over a wireless network is ___
ddd [48]

Answer:

The most serious threat to offshore industrial systems is external access to control systems. Unwanted access to the human/machine interface (HMI) can allow third parties full control of a system. Zybersafe provides protection of the integrity of data that traverses the Ethernet connection between a company’s headquarters and a remote system.

4 0
4 years ago
Question 1(Multiple Choice Worth 5 points)
vlabodo [156]

Answer:

Information assurance

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Information assurance is a broad category that is typically used by cybersecurity or network experts to protect sensitive user information such as passwords, keys, emails, etc., in both digital and hard-copy forms

6 0
3 years ago
This function chooses the screen to display based on the score.What is the correct way to call this function?
mario62 [17]

Answer:

checkWin();

Explanation:

its in the code

7 0
3 years ago
Read 2 more answers
The elements of an integer-valued array can be set to 0 (i.e., the array can be cleared) recursively as follows: An array of siz
marta [7]

Answer:.......

void clear(int *array, int length){

 

  if (length == 0)return;  

 

  array[0] = 0;  

 

  clear(array + 1, length-1);

}

Explanation:

The void function accepts an integer array.

7 0
4 years ago
Other questions:
  • Which type of drawer has three dispensing modes: single-dose, multi-dose, and matrix?
    13·1 answer
  • Where is a 3D modeler most likely to work?
    6·1 answer
  • For almost all networks today, including the internet, the communication protocol used is called ____.
    15·1 answer
  • Need help with this​
    5·1 answer
  • True or false.local and cloud backup differs in where the backup is saved
    15·2 answers
  • What will be result of below if statement.
    13·1 answer
  • Your computer is taking longer than usual to open files and you notice that your hard drive light stays on longer than usual whi
    9·1 answer
  • Quick!! Im taking a timed test so pls hurry!! Ill even mark as brainliets!!
    5·2 answers
  • Which of the following screen elements is a horizontal bar that displays at the
    8·1 answer
  • What is obamams last name
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!