1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
musickatia [10]
3 years ago
11

If you want to change the name or file type of an existing word processing document, what command should you use?

Computers and Technology
2 answers:
mezya [45]3 years ago
8 0
I think that the answer is "save as"
Novay_Z [31]3 years ago
3 0
The command that you would use would be B save as, as it will copy the file and give you a prompt to change the name
You might be interested in
An article explaining the uses of the parts of a computer​
Luda [366]

Answer:

A infographic article is what you are talking about

4 0
2 years ago
. Some countries lack physical resources, like computers or network connections, making it difficult to keep up with the technol
MArishka [77]

Answer:

The digital divide

Explanation:

A digital divide is any uneven distribution in the access to, use of, or impact of Information and Communication Technologies (ICT) between any number of distinct groups. These groups may be defined based on social, geographical, or geopolitical criteria, or otherwise.

The National Digital Inclusion Alliance, a US-based nonprofit organization, has found the term "digital divide" to be problematic so instead they use the word "Digital Inclusion".

Digital Inclusion refers to the activities necessary to ensure that all individuals and communities, including the most disadvantaged, have access to and use of Information and Communication Technologies (ICTs). This includes 5 elements:

1) affordable, robust broadband internet service;

2) internet-enabled devices that meet the needs of the user;

3) access to digital literacy training;

4) quality technical support;

5) applications and online content designed to enable and encourage self-sufficiency, participation and collaboration

4 0
3 years ago
Read 2 more answers
Write a function named change() that has an integer parameter and six integers reference parameters named hundreds, fifties, twe
Dmitry_Shevchenko [17]

Answer:

The code for this question is attached below:

8 0
3 years ago
The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" states that a crucial component of computer hacking lies in
slega [8]

Answer: The statement implies that the hackers psychologically manipulate the human to access the information they need.

Explanation: The author states that the hacker does not only exploits technology to get system access or to gather information. But there is another pivotal part of hacking. He refers to this part as "social engineering".

Social engineering from information security perspective means manipulate human emotions and convincing them to disclose some confidential information. Hacker often hacks or defrauds after gaining confidence and trust of a person.

Phishing is an example. It is a fraudulent technique for getting some secret information. Phisher sends an email pretending to be from some reputable organization to persuade people to divulge private information like passwords and credit card numbers, ATM card pin etc.

5 0
3 years ago
Which image file format consumes the most file<br> space?<br> 0<br> GIF<br> JPEG<br> PNG
gogolik [260]

Answer: jpeg becauuse itss correct

5 0
3 years ago
Other questions:
  • What is after Windows 8.1
    11·2 answers
  • \Read the sentence.
    12·1 answer
  • Kim is creating a PowerPoint
    13·1 answer
  • What is the HCF of smallest prime number and the smallest composite number?​
    12·1 answer
  • Reply emailing a student who is asking about audio materials​
    6·2 answers
  • Why was the tesla model s help change the was we see EV
    12·1 answer
  • You are a developer for a news, entertainment, lifestyle, and fashion website. User traffic has steadily increased month-over-mo
    11·1 answer
  • In addition to reduced power consumption, what is an advantage of using hyperscale cloud computing data centers?
    8·1 answer
  • state an application that would be better to write c++ than java and give a rationale for your answer
    5·1 answer
  • What is the greatest number of bits you could borrow from the host portion of a class B subnet mask and still have at least 130
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!