1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zheka24 [161]
3 years ago
15

I NEED THIS DONE ASAP ILL DO IT FOR 50 POINTS

Computers and Technology
2 answers:
NNADVOKAT [17]3 years ago
7 0

The answer to the question is (B) templates.

Templates, in the context of a document, is <em>a sample document that is already formatted according to the purpose of the document – this sample can be modified by the user according to the conditions that she or he needs to fulfill.</em> Microsoft Word has this option, and you have more options available if you are online than if you’re offline.

tatiyna3 years ago
6 0
B) Templates, like on Google Slides or Powerpoint.
You might be interested in
Image-editing software is used to _____.
bulgar [2K]

Answer:

B)enhance a photograph

3 0
3 years ago
Read 2 more answers
What is search engine
koban [17]
Search engine is a software to help find you results over the internet.

Examples of search engines are: Google, Safari, Yahoo etc.
4 0
3 years ago
Read 2 more answers
What is computer Network?​
spayn [35]

Answer:

\boxed{\sf {view \: explanation}}

Explanation:

A computer network is a network of computers that can share data among the computers.

7 0
3 years ago
The concept of _________________ comes from the acknowledgment that data changes form and often gets copied, moved, and stored i
saveliy_v [14]

Answer: data loss protection

Explanation:

In any organization or enterprise it is very essential to provide protection from data loss to avoid breaches by unauthorized accesses and to secure the data irrespective of whether it is in rest or motion.

It is known that data changes its form when it is copied, moved and stored in different memory location so in this process a lot of sensitive data might be exposed to the outside world and left into the hands of the unauthorized for easy of access to it.

So once a security breach is possible through the system or into the network of the organization it would expose all the application database, emails, spreadsheets and the personal workstation files. So in such a scenario the importance of data loss protection is highlighted and must be given due importance.

8 0
3 years ago
If you were going to construct a table that only included shape names with number prefixes, which shape would you include
NikAS [45]
The answer would be A. square
3 0
4 years ago
Other questions:
  • Which disk drive type contains a magnetic HDD with onboard flash memory serving as a non-volatile cache?
    6·1 answer
  • Due to the internal style sheets of some browsers, your website may look different to someone who is using firefox as opposed to
    11·1 answer
  • Graphic designers sometimes must adjust the spacing between letters so that the result looks right to them. This is called
    12·1 answer
  • Which statement is true of Web-based electronic data interchange (Open EDI)? a. It consists of international agreements on priva
    7·1 answer
  • Which job role requires you to create user guides for computer products and services?
    11·1 answer
  • List five application programs you recommend, and write a sentence explaining why.
    9·1 answer
  • List of rules for expert systems​
    6·1 answer
  • Some people recommend deleting social media accounts because of the troubling legal and ethical implications of social media. Do
    9·1 answer
  • Office 365 ProPlus can be deployed to your enterprise. When doing so, which tool enables you to choose the language, hardware ar
    5·1 answer
  • What is the bandwidth for asymmetric digital subscriber line<br> (ADSL)?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!