1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Archy [21]
3 years ago
14

A. What is MS-Word ? Write its uses.

Computers and Technology
2 answers:
solmaris [256]3 years ago
6 0

Answer:

MS word is Microsoft word and you can use MS Word in daily life and business to create professional-looking documents such as resume, letters, applications, forms, brochures, templates, business cards, calendars, reports, eBooks, and newsletters in speed with high quality.

Explanation:

Temka [501]3 years ago
3 0

Answer:

MS-Word is the popular word processor developed by Microsoft corporation, USA which allows us to create documents like notes, letters, memos, reports, etc.

  • uses of Ms - word are:-
  1. it helps us to prepare a document in nepali language.
  2. It provides many facilities to format a document .
  3. it helps to create documents.
  4. it is helpful in inserting tables, pictures and charts in a document .

<h3>hope it is helpful to you ☺️</h3>
You might be interested in
You are able to change the formatting of a table after it is inserted into a placeholder. True or false
aliina [53]
True, because you can always remove the placeholder afterwards.
3 0
4 years ago
Read 2 more answers
________ is an encryption standard used for secure transactions such as credit card processing and online banking. TLS DMZ White
Fynjy0 [20]

Answer:

TLS

Explanation:

In the field of computer security, TLS refers to Transport Layer Security it is closely related to the Secure Sockets Layer (SSL) although TLS is more commonly used these days. They are both techniques in cryptography that provides for the safe transfer of information between two parties (servers, systems and user applications)

TLS particularly provides a balance between transmission speed and data security through the use of symetric and asymmetric cryptography and the encryption and decryption key is the session key at both ends (sender and reciever), as such TLS has found usage in most advanced data exchange systems like credit card processing and online banking.

8 0
4 years ago
Devices used for viewing images from one computer to another over the internet
garri49 [273]
Its a monitor otherwise the screen on a computer
3 0
3 years ago
Your recovery/recycling machine has r-502 refrigerant in it. you now have to recover refrigerant from a unit with r-22. what mus
zimovet [89]
Recover as much of the R-502 from the recovery unit as possible, change filter, and evacuate. In addition, to alter the compressor on a system containing R-410A, the person must isolate the compressor then evacuate the isolated section of the system to atmospheric pressure and hold. If system pressure does not increase, then remove the compressor. The recovered refrigerant may encompass acids, moisture and oils and every air conditioning or refrigerating system should be secure by a pressure relief device. 
5 0
3 years ago
Hey, anyone like will u jus help meh like pleaseee
jeyben [28]

Answer:

1

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following is NOT a consideration designers must make when using colors?
    15·1 answer
  • An Internet connection problem for customers is found to be outside a carrier's regional office. As a result, which area needs t
    9·1 answer
  • 6.6 Write a function named timesTen. The function should have an integer parameter named number. When timesTen is called, it sho
    7·1 answer
  • You open a link in a new tab by holding the _______ button while clicking the link
    8·1 answer
  • IN JAVA Write a program with total change amount as an integer input that outputs the change using the fewest coins, one coin ty
    15·1 answer
  • Creating Classes
    12·1 answer
  • When would it be most beneficial to package a presentation on a CD? Check all that apply. when sending the file via email for di
    6·2 answers
  • Rebbeca has finished with the research and outline portion of her slide presentation. Now, the next logical step is to begin wor
    11·1 answer
  • You can use the ____ method to search a string to determine whether it contains a specific sequence of characters.
    14·1 answer
  • Daily IT Question
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!