1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bagirrra123 [75]
4 years ago
15

Which of the following cannot be created using Word software?

Computers and Technology
1 answer:
Arturiano [62]4 years ago
7 0
3-database of new clients
You might be interested in
Kahoot plzkahoot plzkahoot plz
Evgen [1.6K]

MAKE ONE AND SEND THE CODE !! I'M SO BORED RN IT ISN'T NORMAL HAHAHAHA

4 0
3 years ago
Which line defines a valid CSS rule?
sladkih [1.3K]

Answer:

i beleive its c  

Explanation:

sorry if its wrong thats what i think it is

5 0
3 years ago
Read 2 more answers
What are two critical properties for a cryptographic hash function?
AleksandrR [38]

Answer:

The ideal cryptographic hash function has four properties: it is quick to compute the hash value for any given message. it is infeasible to generate a message from its hash value. it is infeasible to modify a message without changing the hash value.

3 0
3 years ago
Select the correct answer from the drop-down menu. Which two technologies support the building of single-page applications? and
Nataliya [291]

Answer:

JavaScript frameworks and Ajax

Explanation:

6 0
4 years ago
You can use the ____ utility to zero in on the service or other program that is slowing down startup. 1. gpupdate 2. MSconfig 3.
Step2247 [10]
I'd say MSconfig, you can use that and view the 'processes' tab, but it will make you open up the task manager.
3 0
3 years ago
Other questions:
  • Assume you're using a three button mouse. to access shortcut menus you would
    10·1 answer
  • What file formats can you safely use in a video presentation
    14·1 answer
  • What are 5 actions that you can do to take care of your camera
    14·2 answers
  • A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The c
    14·1 answer
  • The purpose of the align phase is to align your team with ______.
    9·1 answer
  • After ensuring the equipment is turned off and unplugged, what is the nest step in cleaning larger equipment by hand
    7·2 answers
  • Where is the quick access toolbar located?
    7·1 answer
  • Subscribe to Markiplier
    15·2 answers
  • Lesson 2.7 Code Practice #2
    13·1 answer
  • What is used for risk response control?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!