1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tangare [24]
3 years ago
8

Within a word processing program, predesigned files that have layout and some page elements already completed are called

Computers and Technology
1 answer:
dexar [7]3 years ago
4 0

Answer:

I think it's B) templates

     

                   Sorry if it's wrong I'm not sure!!

Explanation:

You might be interested in
Pa answer po thank you​
Arturiano [62]

Answer:

1. software (1st row)

2. binary code (6th row)

3. pc language (11th row)

I found these three!!!

4 0
2 years ago
Read 2 more answers
Prove that the dual of the exclusive-OR gate is also itscomplement
Tresset [83]

Answer:

Explanation:

The dual of a function means replace AND with OR and replace OR with AND.

XOR gate of A , B is

A \, XOR\, B = AB' + A'B

So, Dual of A XOR B is ( replace AND with OR and OR with AND)

= (A+B')(A'+B)

Complement of A XOR B is (A XOR B) ' = (AB' + A'B) ' = ((A)' + (B')') ((A')' + (B)') = (A'+B)(A+B') (In finding compliment AND becomes OR and OR becomes AND ).

By inter changing the above product of terms  

Complement of A XOR B = (A + B') (A' + B)

So, Dual of A XOR B = Complement of A XOR B.

7 0
3 years ago
Which tag pair contains the items in an ordered or unordered list?
Serga [27]
```
<ul>
  <li>item1</li>
  <li>item2</li>
</ul>
```
It's the same for ol.
7 0
3 years ago
In basic network scanning, ICMP Echo Requests (type 8) are sent to host computers from the attacker, who waits for which type of
Hoochie [10]

Answer:

d. ICMP Echo Reply (type 0)

Explanation:

ICMP or internet control message protocol is an Internet layer protocol in the TCP/IP suite. It works together with routing devices like the router to send messages based on results sensed in the network.

The RFC 1122 has stated that the ICMP server and end user application be configured or installed in user devices, for receiving and sending ICMP echo request packets and reply. The process is called pinging.

For an attacker to implement ping of ping, he needs to confirm if the target user in live by sending an ICMP echo request packet type 8, to receive an ICMP echo reply type0.

4 0
3 years ago
Robert is leading a project online that includes students from different cultures. Two of the students spend most of the time li
enyata [817]

Answer:

A & C

Explanation:

8 0
3 years ago
Other questions:
  • A corporation needs an operating system that allows the various teams in its office to network and collaborate on projects. Whic
    13·2 answers
  • _____ are types of changes that occur when text has been omitted from a document and must be inserted later.
    8·2 answers
  • No matter what medium connects computers on network-copper wires, fiber-optic cables, or a wireless setup; the same protocol mus
    11·1 answer
  • John has subscribed to a cloud-based service to synchronize data between his smartphone, tablet, and PC. Before allowing the dat
    10·1 answer
  • (Convert milliseconds to hours, minutes, and seconds) Write a function that converts milliseconds to hours, minutes, and seconds
    12·1 answer
  • A software package developed to handle information requirements for a specific type of business is called a(n) ____. A. outsourc
    10·1 answer
  • Which step in the software development life cycle analyzes the scope of work?
    6·1 answer
  • Will, there be any presents this year
    15·1 answer
  • Look at (c), is it accurate? ​
    9·2 answers
  • Which type of GUI control would be best to use if you wanted the user to select one date from a list of three possible dates to
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!