1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kykrilka [37]
3 years ago
13

Which extension is appropriate for Word document templates?

Computers and Technology
2 answers:
expeople1 [14]3 years ago
8 0
The answer to this question is A
Anni [7]3 years ago
8 0

Answer:

A - .docx

Explanation:

Hope this helps!!

:)

You might be interested in
What are the example of dedicated computers?
Drupady [299]
A dedicated server is a single computer in a network reserved for serving the needs of the network. For example, some networks require that one computer be set aside to manage communications between all the other computers. A dedicated server could also be a computer that manages printer resources.
8 0
3 years ago
Which type of hacker represents the highest risk to your computer?
Deffense [45]

Answer:

The hacker which represents the highest risk to my computer is the Script Kiddie.

Explanation:

A Script Kiddie cannot make their own programs.

They hack by using existing codes, scripts, web shells etc to access a work station, mutilate webpages etc.

The difference between a Hacker and a Script Kiddie is that a hacker does not need another person's code. They are skilled at writing their own codes which are can be very potent. This level of skill can be difficult to attain except for very bright minds.

The script kid needs very little knowledge of scripts and they are well on their way to causing damage.

Cheers!

4 0
3 years ago
There are several different types of RAM, each with its own purpose. Name the three types of RAM and briefly describe their func
Neko [114]
Well we have SRAM(Static Random Access Memory) is faster, have a lower density but it is more expensive.
While DRAM(Dynamic Random access memory) is just the opposite.
Those are the only two, I know exist.
3 0
3 years ago
Read 2 more answers
The ability for a protocol or program to determine that something went wrong is known as_________.
777dan777 [17]

Answer:

The correct answer to the following question will be Error-detection.

Explanation:

Error-detection: The detection of errors caused during the transmission from the transmitter to the receiver by damage and other noises, known as Error-detection. This error-detection has the ability to resolute if something went wrong and if any error occurs in the program.

There are mainly three types of error-detection, these types can be followed:

  • Automatic Repeat Request (ARQ)
  • Forward Error Correction
  • Hybrid Schemes

There are two methods for error-detection, such as:

  • Single parity check
  • Two-dimensional parity check

4 0
3 years ago
From the Start screen (on Excel), you can
Alex
I think (a) is the answer because this is the screen that it should open when u use it

6 0
3 years ago
Read 2 more answers
Other questions:
  • If your laptop is not able to connect to your wireless network, which of the following might be a likely cause of the problem?
    11·2 answers
  • A) A cable that is mainly used in the cable television network
    11·1 answer
  • What is one of the most effective security tools available for protecting users from external threats?
    15·1 answer
  • Applications software is also known as
    14·2 answers
  • How many report charts can be added to the account page layout to meet this requirement? A sales manager would like to look at a
    14·1 answer
  • Which line of code outputs the decimal portion of a float stored in the variable x? print (x % 1000) print (x) O print (x / 1000
    13·1 answer
  • How can a search be narrowed to only search a particular website????
    15·1 answer
  • Does anyone know 7.1.3: Firework karel?
    5·1 answer
  • You are the Emergency Management Director of a small island nation. Your nation has come under Cyber-attack and the attackers ha
    7·1 answer
  • Suppose the cache access time is 10ns, main memory access time is 200ns, and the cache hit rate is 90%. Assuming parallel (overl
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!