1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gnom [1K]
3 years ago
7

Choose the answer that best completes the statement.

Computers and Technology
2 answers:
Anestetic [448]3 years ago
4 0
1. A - everything starts there
2. D - always
3. C - true
laila [671]3 years ago
3 0
The first guy answer this was wrong it’s not A

B

D

C
You might be interested in
Rob is planning his housewarming party. He wants to design an invitation and personalize it for each invitee. He needs to create
lara31 [8.8K]

Answer:

1: Word Processor

2: Graphics Software

3: Mail Merge

Explanation:

Given

1. Create a list of invitees

2. Design an invitation card

3. Personalize the card

Creating a list of invitees is a task that requires basic activities such as typing, using of numbers and bullets; these activities can be achieved using word processing software programs such as Microsoft Word, WordPerfect, amongst others.

<em>So task 1 requires a word processor</em>

An invitation card is a piece of graphics that can be perfectly handled by graphics software programs such as CorelDraw, Adobe Photoshop, etc.

<em>So task 1 requires a graphics software</em>

Task 3 can be achieved using mail merge and this is because mail merge can be used either to print or to mail recipients. While mailing the recipients, one can easily personalize each letter (or in this case, an invitation card) to suit the recipient it is being directed to.

5 0
3 years ago
A file with a .bat file extension is called a batch file. You can use a batch file to execute a group of commands, sometimes cal
Elan Coil [88]

Answer:

Create a text file. And add this code in it:

@echo off

You are welcome to the batch programming!

And now save it with .bat file type. Give it any name you want.

And to run the bat file, double click the bat file. It will be running.

You can run it from command prompt as well. Type as below:

C:\folder\batch_name.bat.

Now, we can add as many commands in the file as we want, and we can do the batch programming.

Explanation:

Please check the answer section.

8 0
3 years ago
A person can receive an electric shock by
trapecia [35]

the answer is C. completing an electrical circuit

4 0
4 years ago
Read 2 more answers
ICS encourages jurisdictions to use common terminology. Common terminology:
ololo11 [35]
The answer is (a) Uses plain English to allow personnel from different agencies to work together.
ICS or Incident Command System is a systematic tool used for the control, command, and coordination of emergency response. To work together, the ICS allows the use of common terminology and operating procedures.  
3 0
3 years ago
Which loan type requires you to make loan payments while you’re attending school?
LUCKY_DIMON [66]
The answer is student loans
3 0
4 years ago
Read 2 more answers
Other questions:
  • In which of the following scenarios would it be best to use a for loop?
    6·1 answer
  • The internet is best described as a vast
    7·2 answers
  • Suction cup-type headlamp aiming equipment may be used on:
    11·1 answer
  • The scope of a variable declared inside of a function is:
    8·1 answer
  • What is the most efficient way to prevent the spelling checker from repeatedly flagging a correctly spelled name in all of your
    5·1 answer
  • You want to substitute one word with another throughout your document. What tool(s) should you use?
    9·1 answer
  • ELO 3.6 Which type of iSCSI name requires a registered domain name to generate a unique iSCSI identifier?
    12·1 answer
  • A mobile phone app asks the user to point the phone's camera at a room and then applies the phone's LIDAR scanning function. Wha
    8·2 answers
  • Write 10 sentences of your own and underline the verb.
    11·1 answer
  • Describe the fundamental security policies outlined by PCI DSS, FISMA, and COBIT. In a subsequent paragraph, identify at least 2
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!