1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
madreJ [45]
3 years ago
11

Advantages of desktop publishing over traditional methods include       

Computers and Technology
1 answer:
Licemer1 [7]3 years ago
6 0
From what my teacher taught us it would be c.
You might be interested in
I wish we could visit Paris for the holidays into exclamatory​
shusha [124]

Answer:

wdym

Explanation:

3 0
3 years ago
Read 2 more answers
Which of these is not a way of avoiding email fraud and scams?
Sever21 [200]

Answer:

"If you aren't sure if a link is legitimate, click it to see where it goes."

Explanation:

If you click on a unknown URL the host of the website can steal a lot of information from you computer. Like your geolocation  

7 0
3 years ago
Implication of technological literacy to a teacher training today
Dafna1 [17]

<u>Implication of technological literacy to a teacher training today :</u>

  • First of training has to be under technology literacy before training starts. Trainer also should have enough knowledge on technology literacy.
  • Trainer can take printed materials to share the document on the topic which to be covered and circulated to trainers
  • Since it given as general topic, training teacher has to cover the following topic, general on computer and purpose of computer today's life, life cycle of computer grown from old PC to laptop and tablet.
  • Next topic such be covered operating system and explain about the operating system and different technology is used.
  • Revolution on technology should be also covered and explained in details.
8 0
3 years ago
The WorkOrders table contains a foreign key, ClientNum, which must match the primary key of the Client table. What type of updat
OlgaM077 [116]

Answer:

Changing the customer number on a record in the Orders table to a number that does not match a customer number in the customer table would violate referential integrity.

If deletes do not cascade, deleting a customer that has orders would violate referential integrity.

If deletes cascade, customer can be deleted and all orders for that customer will automatically be deleted.

8 0
3 years ago
What sequence is used to create a brochure document from a template?
GenaCL600 [577]

Answer:

computer is used to create a voucher document

6 0
3 years ago
Read 2 more answers
Other questions:
  • Write an essay on online collaboration, how to do it, the challenges, resolving the challenges, and consider whether the risks a
    12·1 answer
  • Which type of password would be considered secure?
    15·1 answer
  • PLEASE HELP!!!!! David has gone to the Niagara Falls with his camera. He wants to click photos of the people around him and also
    11·2 answers
  • Does YouTube have the potential to change academia as we know it, or is that a bit of a stretch? Explain.
    9·2 answers
  • 1) Identify at least four examples and uses of application software.​
    5·2 answers
  • When proposing a plan in detail for video production phases, fundraising, and outreaching, which section will you use to make su
    14·2 answers
  • Select the correct answer.
    14·1 answer
  • A(n) ________ will clear all user data and setting changes, returning the device's software to the state it was in when it left
    6·1 answer
  • Why do Linux administrators prefer to give sudo access to application teams instead of letting them su to root?
    6·1 answer
  • When an EC2 instance is being modified to have more RAM, is this considered Scaling Up or Scaling Out?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!