1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex Ar [27]
4 years ago
7

Which activity uses a feature of a word processor?

Computers and Technology
2 answers:
Basile [38]4 years ago
6 0

Adding drawings and tables to your document

You can use very many applications out there to add drawings and tables. The list of such applications is very big indeed. You can use Microsoft Word to achieve a lot and this includes adding drawings and documents to your document.

Anvisha [2.4K]4 years ago
3 0
The activity that uses a feature of a word processor is the last given answer. Recreating the same document multiple times to print multiple copies. Although some word processors have all the features stated above now a days. Word processors are helpful in composing, editing and printing text documents.
You might be interested in
A computer's hard disk drive holds 8 x 10^10 bytes of information. If Jill buys an extra memory stick that holds 5.1 X 10^8 byte
denis-greek [22]

Answer:

The computer will store 8.05 *10^10 bytes of information.

Explanation:

This is the same as saying that the computer will now have 80.51 Gigabytes ( 1gb = 1.000.000.000 bytes) of storage. In this case, the number is represented in its decimal form, and the previous one is displayed in Scientific Notation.

8 0
3 years ago
A(n) ________ is a private network that uses a public network (usually the _____) to connect securely to remote sites.
Paul [167]

A LAN VPN is a private network that uses a public network (usually the internet) to connect securely to remote sites.  

Thank me later. :)

8 0
3 years ago
The type of database that is most capable of supporting complex data types is _____. Select one: a. sequential files b. relation
Anestetic [448]

Answer:

Object-Oriented DBMS.

Explanation:

Like classes in Object oriented programming Object-Oriented DBMS is can store objects.It follows an Object oriented data model with the properties of classes and the properties of Object oriented programming also.Objects can be in the form of complex data types or different data types.

6 0
3 years ago
Read 2 more answers
A data center designer requested additional lighting for the entrance to the data center as well as the removal of a object whic
Ira Lisetskai [31]

Answer:

SURVEILLANCE-SPECIFIC DESIGN.

Explanation:

Defensible space offers a series of architectural guidelines that can be used in the design of new urban residential complexes to promote both the residential group’s territorial claim to its surroundings and its ability to conduct natural surveillance. The designs are: site interrelationship design, site design, street design and surveillance-specific design.

Surveillance-specific design can be used to increase general visibility by providing adequate lighting, by reducing or eliminating physical barriers to visibility, and by the visibility-promoting location of key areas (entrances, lobbies, elevator waiting areas, parking areas e.t.c.) so as to be directly visible from as many viewpoints as possible.

Since the data center designer requested additional lighting for the entrance to the data center as well as the removal of a object which is blocking security's view of the entrance, then it is an example of SURVEILLANCE-SPECIFIC DESIGN.

6 0
3 years ago
Which describes the relationship between enterprise platforms and the cloud?
AlladinOne [14]

Answer:

All enterprise platforms are cloud based.

4 0
3 years ago
Other questions:
  • What are short handled screwdrivers used for?
    12·1 answer
  • The following program segment is designed to compute the product of two nonnegative integers X and Y by accumulating the sum of
    9·1 answer
  • TCP is a Transport-layer protocol used to communicate between applications, but it's a lightweight Transport-layer protocol, mea
    10·1 answer
  • In this lab, you complete a partially prewritten Python program that uses a list.
    12·1 answer
  • Write a function solution that, given an integer N, returns the maximum possible
    8·1 answer
  • sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses i am a failure sun
    7·2 answers
  • PLEASE HELP ME I WILL GIVE BRAINIEST AND 40 POINTSPython Project Worksheet
    12·1 answer
  • Characteristics of hybrid computer​
    11·1 answer
  • A serial schedule:
    8·1 answer
  • which one of the following would not normally be found in an organization's information security policy?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!