1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Virty [35]
3 years ago
13

In which of the following situations would you want to use a word processing template?

Computers and Technology
2 answers:
creativ13 [48]3 years ago
5 0
<h2>Answer:</h2>

<u>The correct answer is A. </u><u>You need to write a letter to a company you’d like to work with, and have specific questions to ask.</u>

<h2>Explanation:</h2>

Applying for a job is a very formal type of document which contains all the required and necessary information about a person who wants to apply. So a letter is typed in Microsoft word format to keep the document aligned and beautiful. Word template can make it professional which otherwise becomes hard to apply for a job in the absence of quality editing.

MAVERICK [17]3 years ago
5 0

The correct answer would be (B).

You might be interested in
Which character is often used to identify registered trademarks and is available on the Insert tab and Symbols
olga_2 [115]

Answer:"TM"

Explanation:

6 0
3 years ago
Want to.learn about computers​
MAVERICK [17]
Yes...I do want to learn about computer
6 0
3 years ago
The ________ model allows the owner of a resource to manage who can or cannot access the item. Owners maintain this access throu
blagie [28]

Answer:

Discretionary Access Control model

Explanation:

Discretionary Access Control (DAC) gives owners of a resource full control of objects/items they have created or been given access to, this also includes sharing the objects/items with other subjects. These owners have control over their data and maintain access through ACLs. The access-control list (ACL), is a list of permissions attached to an object in a computer file system.

The Owners can decide to grant other users access to their files, change their attributes, alter them, or delete them. DACs are discretionary because the owner can transfer information access to other users.

5 0
3 years ago
Edhesive 8.5 code Practice help me pls
Hoochie [10]

Answer:

twainQuotes = ['I have never let my schooling interfere with my education.', 'Get your facts first, and then you can distort them as much as you please.', "If you tell the truth, you don't have to remember anything.", 'The secret of getting ahead is getting started.', "Age is an issue of mind over matter. If you don't mind, it doesn't matter. "]

print(twainQuotes)

twainQuotes.sort()

print(twainQuotes)

twainQuotes.insert(1,'Courage is resistance to fear, mastery of fear, not absence of fear.' )

print(twainQuotes)

Explanation:

ok

3 0
3 years ago
Should Gladys call the legal authorities? Which agency should she call?
tiny-mole [99]

Answer:

The answer to this question can be defined as below:

Explanation:

Yes, Gladys is called the legal authority. In the whole situation, legal officials can be concerned, even though the situation can proceed to fraud. Then it will be acceptable to make a report to the Justice Department.

  • In a corporation, it should always tend to avoid the issue, like leaking information, leaking the glamorous info to the press.
  • They may have a contract within the organization to avoid all of this.
3 0
3 years ago
Other questions:
  • Your company is developing a new marketing campaign and wants to know which customers have never placed an order. You will need
    10·1 answer
  • In this story, the reader is strongly encouraged to believe that Skidmore is guilty of poisoning his brother Manchester. Explain
    6·1 answer
  • Help, please!! A file named "games.txt" exists and has 80 lines of data. You open the file with the following line of code. aFil
    6·1 answer
  • You are running an art museum. There is a long hallway with k paintings on the wall. The locations of the paintings are l1, ...,
    13·1 answer
  • A relative path name defines a path from_________________________ Select one: a. from the UFD (user file directory) b. the curre
    6·1 answer
  • What is the output of the following program when the method is called with 4?
    11·1 answer
  • What safety feature melts to protect a circuit? a. fuse b. diode c. three-prong plug d. transistor
    10·2 answers
  • Is Missouri a free state or a slave state​
    13·2 answers
  • In our discussion of Computer Hardware, we talked about three essential hardware components that are there inside every computer
    14·1 answer
  • How to edit slides into video.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!