1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Papessa [141]
3 years ago
12

To open a Google Doc in another software application, the user must first download it. True or false?

Computers and Technology
2 answers:
DochEvi [55]3 years ago
8 0

Answer:

True

Explanation:

alexira [117]3 years ago
5 0

Answer:

True

Explanation:

You might be interested in
What is the full path and filename for the file on a Debian Linux distribution that displays the time zone settings?
lesya [120]

Answer:

/etc/timezone

Explanation:

Debian based Linux distribution is a free distribution software and an operating system. It is composed of a open source and free source software. It is one of the most popular distributions.

A computer file name is a unique system of identifying the computer stored file in the file system. The names of the different file system have different formats or extensions in the file name and imposed different file restrictions.

In the context, the full path and the file name of a file that displays a time zone settings on a Debian Linux distribution is " ../etc/timezone".

3 0
3 years ago
Cerinţa
Firdavs [7]
Uummmm English please
4 0
3 years ago
What does limited access to a document mean?
Licemer1 [7]
The second last one is the answer i think
7 0
3 years ago
Read 2 more answers
What laws are broken when you hack someone?
postnew [5]

Answer:

it depends

Explanation:

if you are hacking for a purpose that is benefiting the person being hacked, that is ethical hacking. ethical hacking is not illegal, as long as you get permission from the person being hacked.

if you hack someone without their knowledge, that is unethical hacking, and that is in many cases, a crime, and if it has enough of a detrimental effect on a companys process, it could land you into prison and earn you a hefty fine.

ethical hacking is good for testing a networks security, and if all is well, the ethical hacker shouldnt be able to get into a network if it is secured properly.

6 0
3 years ago
Task 3&amp;4, please <br> with the formula
Anastasy [175]
It’s 12 because 3 times 4 is twelve, hope i helped!
6 0
2 years ago
Other questions:
  • What type of electronic monitoring involves an offender being contacted periodically by telephone or beeper to verify his or her
    5·1 answer
  • A ____ operating system should be capable of supporting the applications and tools necessary to support Internet operations.
    10·1 answer
  • Top/bottom rules allows user to apply conditional formatting cells that fall within the top or bottom numbers or percentile. how
    7·1 answer
  • Which types of operating systems execute program independent of the users and generate output within a specific amount of time?
    5·1 answer
  • This has nothing to do with anything school related, but I'm new to car audio and I was wondering, what happens or what would ha
    13·1 answer
  • Which of the following is NOT an example of soft skill?
    8·1 answer
  • How are software myths affecting software process?. Explain with example​
    9·1 answer
  • What do you mean by Information Technology explain​
    13·2 answers
  • According to the video, what are some concerns of Webmasters? Check all that apply.
    7·2 answers
  • What is the impact of VR on Educational Learning rather than games?​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!