1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
timurjin [86]
3 years ago
13

A(n) _________________________ is a character that word displays on the screen but is not visible on a printed document.

Computers and Technology
1 answer:
oksano4ka [1.4K]3 years ago
6 0
Nonprint ...but im like 99 percent sure
You might be interested in
Within the seven domains of a typical IT infrastructure, there are particular roles responsible for data handling and data quali
nikitadnepr [17]

Answer:

The answer is "auditors"

Explanation:

Description to this question can be described as follows:

  • Auditors are professionals who analyze business and corporate accounts to determine, that the financial reports are accurate and lawful. It will serve as a consultant to suggest possible measures for risk avoidance or cost reduction.
  • Data security is the mechanism to avoid theft, loss of sensitive information, and information quality is critical and it is not able to know or stay in contact with your clients without high-quality data, that's why auditors are the correct answer and other choices can't be defined in the following senior.
7 0
3 years ago
Images are available in many formats, such as tif, bmp, gif, jpeg, and ____.
Lerok [7]
<span>Images are available in many formats, such as tif, bmp, gif, jpeg, and png.

</span>Hope that helps.
7 0
2 years ago
Which of the following is the BEST solution to allow access to private resources from the internet?
notsponge [240]
FTP stands for file transfer protocol. FTP is used to transfer files between computers over the Internet. FTP servers can be setup to allow users to access the information anonymously or require registration for access.
7 0
3 years ago
The sales management team requires that the Lead Source field of the Lead record be populated when a Lead is converted. What wou
Sav [38]

Answer: A. Validation rule

Explanation:

Validation rules can be used to ensure that fields are populated because they can verify if the data being inputted meet the requirements of the administrators by returning a 'True' or 'False' response after testing. If the result is false, the user will be unable to move on until they adjust the field.

For example, Field length checks on websites are a Validation rule where you are only allowed to input a set number of characters and anything less or more will be denied, such as in the case of inputting phone numbers.

By including a Validation Rule that the LeadSource field of the Lead record be populated when a Lead is converted, the developer will be able to make sure that a user populates the Lead Source field prior to converting a Lead.

5 0
3 years ago
What is Application Software ??
Paraphin [41]


Hi Pupil Here's Your Answer ::



➡➡➡➡➡➡➡➡➡➡➡➡➡


Application software and software that are created to facilitate/perform a specific type of real life application directly for the end user. These are available in the market as single readymade software or as an integrated package like MS Office, Visual Studio or Adobe integrated suite.


There are three types of application software which you would know about ::

# General Purpose Application Software.

# Special Purpose Application Software.

# Customized or Bespoke Purpose Application Software.


⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅




Hope this helps .........
6 0
3 years ago
Read 2 more answers
Other questions:
  • Cleo finds herself frequently searching for messages from particular senders or with specific subjects. What should she create
    5·1 answer
  • One of the earlier applications of crypto-graphic hash functions was the storage of passwords to authenticate usersin computer s
    13·1 answer
  • A certain computer has a 4meg address space. how many bits wide is this computer's address bus?
    10·1 answer
  • Devices designed primarily to be used with a company network are called
    12·1 answer
  • A software programâs _________ indicates what can legally be done with that program.]
    5·1 answer
  • How many questions must you answer in Brainly to be able to message people?
    6·2 answers
  • DTE just installed 500kW of solar capacity on the MCCC campus. the cost of the installation was about $3 million. what was the c
    10·1 answer
  • Assume the user responds with a 3 for the first number and a 4 for the second number.
    13·1 answer
  • Give 5 examples for software ​
    9·1 answer
  • What is a disadvantage of communicating on social media?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!