1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex Ar [27]
4 years ago
7

Which activity uses a feature of a word processor?

Computers and Technology
2 answers:
Basile [38]4 years ago
6 0

Adding drawings and tables to your document

You can use very many applications out there to add drawings and tables. The list of such applications is very big indeed. You can use Microsoft Word to achieve a lot and this includes adding drawings and documents to your document.

Anvisha [2.4K]4 years ago
3 0
The activity that uses a feature of a word processor is the last given answer. Recreating the same document multiple times to print multiple copies. Although some word processors have all the features stated above now a days. Word processors are helpful in composing, editing and printing text documents.
You might be interested in
What is the value stored in the variable myNum after the following assignment statement executes? myNum = 23 % 5
netineya [11]

Answer:

% is a modulus operator in most languages, returning the remainder when the preceding number is divided by the following one .  Assuming the language this question pertains to is one of those, then the answer is 3.

7 0
3 years ago
What descriptions can be used for last,first,PR_ID and CID
faust18 [17]

Answer:

x r

Explanation:

this is the answer like it thank you

5 0
3 years ago
What web revolution enables user to generate content​
ch4aika [34]

Answer:

<u>web 2.0 internet</u>

<u>Explanation:</u>

<u>Explanation:</u>

Tim O Reilly in 2004 changed the web with his web 2.0 concept which according to him at the time would allow enable the user to generate content.​

4 0
4 years ago
A pen testing method in which a tester with access to an application behind its firewall imitates an attack that could be caused
sweet [91]

Answer:

a. True

Explanation:

The statement that a pen testing method or penetration test in which a tester who has a means of entry to an application behind its firewall imitates an attack that could be caused by a malicious insider.

A penetration test, which is also refer to as a pen test, pentest or ethical hacking, is an approved simulated cyberattack done on a computer system, performed in order to evaluate the security of the system. The test is carried out to identify both weaknesses or vulnerabilities including the potential for unauthorized parties to penetrate to the system's features and data.

The main purpose of performing this test is to identify any vulnerability in a system's defenses which attackers may take advantage of.

6 0
3 years ago
Write a program with a method called passwordCheck to return if the string is a valid password. The method should have the signa
Ber [7]

Answer:

import java.util.regex.*;

import java.util.Scanner;

public class Password

{

  public static void main(String[] args) {

  Scanner input = new Scanner(System.in);

  System.out.println("Please enter the Password. \n");

  String passwordString = input.next();

  System.out.println(passwordCheck(passwordString));

  }

  public static boolean passwordCheck(String password){

  if(password.length()>=8 && password.matches("[a-z0-9A-Z]+")){

  return true;

  }

  else{

  return false;

  }

  }

}

Explanation:

The Java class "Password" is used by the program to make an instance of the password object and check its validity with the passwordChecker method defined within the Password class. The passwordChecker method only matches alphanumeric passwords, that is, passwords with alphabets and numbers. If a non-alphanumeric character is encountered, the boolean value false is returned.

6 0
3 years ago
Other questions:
  • Give a command that will create a file named listing.dat, in your current (commandsAsst) directory, containing a list of all the
    9·1 answer
  • You have opened the properties dialog box for an installed printer on your computer system. on what tab will you find informatio
    8·1 answer
  • What type of device is the printer?
    13·2 answers
  • What happens when you get 3 warnings on this site?
    9·2 answers
  • A Layer 2 switch configuration places all its physical ports into VLAN 2. The IP addressing plan shows that address 172.16.2.250
    7·1 answer
  • I need help with this
    12·1 answer
  • CSCU EXAM TEST FINAL1-A software or hardware that checks information coming from the Internet and depending on the applied confi
    6·1 answer
  • Which of the following situations is least likely fair use
    6·2 answers
  • Instruction: weird I know (~ ̄³ ̄)~
    5·1 answer
  • Python uses standard order of operations to evaluate equations. True False
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!