1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
8_murik_8 [283]
3 years ago
15

Pleas help with this question: Which statement about word processing software is true?

Computers and Technology
1 answer:
deff fn [24]3 years ago
8 0
Short Answer C

The Primary use of any word processor is to create word documents (like this editor) with the ability to format it with bold letters or <u>underlining</u> or <em>italics</em>. There are many other choices of things to do. All your choices are true but the main one is the third one down.

It can do very simple mathematical calculations if it can create tables (neither of which is possible with this editor. A is incorrect.

D is mostly incorrect. Very few word processors have built in capabilities that would help you with word games. There are some that do. Most don't.

I would hate to create fonts using a word processor. It's remotely possible, but anyone in his right mind would try using a program designed for that.. B is incorrect.
You might be interested in
If the income elasticity for computers is 1.2, and incomes increase by 10%, the demand for computers, using one decimal place an
yarga [219]

Answer:

The answer is "12.0%".

Explanation:

Economically, price elasticity makes a clear distinction between a consumer's production and a consumer's earnings.  

  • In this question, income elasticity is given that is "1.2", and incomes increase percentage is given, that is 10%.
  • The total income elasticity is in percentage is 1.2 \times 10 \% \ = 12.0\  \%.
7 0
3 years ago
What are some activities that work especially well in Outline view? Check all that apply.
bogdanovich [222]

The answer should be A,D,E,and F

8 0
3 years ago
Read 2 more answers
Host computer is:
N76 [4]

Answer:

A

Explanation:

8 0
3 years ago
What should I change my fortnite name to:<br> Barneys broken thumb or I dont have aim assist
Ket [755]

Answer: yes

Explanation:

4 0
2 years ago
What does the following code do? Assume list is an array of int values, temp is some previously initialized int value, and c is
erica [24]

Answer:

It counts the number of items in the given list that are less than Description temp:

Explanation:

Following are the description of the loop  

  • In the given question initially, the value of "j" variable is initialized to 0.
  • After that loop will iterate less then the length of the list array.
  • The  if(list[j] < temp) checks the condition if it is true then c++ increment the value by 1  
  • j++ increment the value of "j" by 1.

4 0
3 years ago
Other questions:
  • Annie is a nutritionist. She is conducting seminars about following a healthy diet in various offices. Annie adds a picture of f
    14·2 answers
  • Write a program that accepts a phrase of unspecified length on the command line. For example: prompt% letter print Operating Sys
    7·1 answer
  • Which wireless communication technology is most likely used when synchronizing device information to an automobile?
    14·1 answer
  • Which of the following is not a component of the programming phase of facility construction? deciding what to build examining sp
    12·1 answer
  • How many bits does it take to store a 3-minute song using an audio encoding method that samples at the rate of 40,000 bits/secon
    12·1 answer
  • The cat store needs your help! The base class Animal has private fields animalName, and animalAge. The derived class Cat extends
    9·1 answer
  • Extended essay on globalization not less than 200​
    6·1 answer
  • Write a function NumberOfPennies() that returns the total number of pennies given a number of dollars and (optionally) a number
    7·1 answer
  • Fields &amp; Methods
    5·1 answer
  • A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their f
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!