1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RideAnS [48]
3 years ago
5

What do application in productivity suites have in common

Computers and Technology
1 answer:
Alchen [17]3 years ago
6 0

Answer:

The function of the suites application is to create presentations and perform numerical calculations.

Explanation:

You might be interested in
Two people, Alice and Bob are using the key sharing algorithm. They have chosen a clock size of 17 and a base of 5. Alice's priv
hjlf

Answer:

fsfsf

Explanation:

6 0
3 years ago
How to give a brainiest on a question? if you teach me i will give brainiest
kipiarov [429]

Answer:

OK

Explanation:

4 0
3 years ago
Read 2 more answers
What is a man-in-the-middle attack​
VMariaS [17]

Answer: An attack where the attackers will interrupt a data transfer happening between parties and in which they will pretend to be the legitimate parties.

Explanation: For example think about two people writing letters to each other back and forth. However you, the attacker can intercept the letters and effectively change the message/contents of the letter going to the other person. This is probably not the best explanation, but simply put a man-in-the-middle attack is when an attacker interupts a transfer and pretends to be the legitimate source.

4 0
3 years ago
Read 2 more answers
Programmers employ the acronym ____ to mean that if your input is incorrect, your output is worthless.
Nataly [62]
The answer is GIGO or the garbage in, garbage out. It is an idea regular to software engineering and science: the nature of yield is dictated by the nature of the information. In this way, for instance, if a scientific condition is disgracefully expressed, the appropriate response is probably not going to be right. It has a tendency to be utilized when discussing information section and databases. Essentially it implies that in the event that you enter off base or wrong information then you have truly entered waste.
8 0
3 years ago
Sarah has to add a picture from her computer file and add a caption to it. Arrange the steps in a correct sequence.
MatroZZZ [7]

Answer:

-Click insert

-Click picture

-Click from file

-Right click the picture

-Select the desired picture and again click Insert

-Click insert caption

-Write the caption and add it

Explanation:

6 0
3 years ago
Other questions:
  • A _____________ is some text or data that is stored on your computer and used by a website to track how you use that site. quest
    8·2 answers
  • Vector graphic is usually required more storage space than bit maps true or false
    10·1 answer
  • Why is musical notation important? What benefits do musicians and others receive from being able to write down and note aspects
    12·1 answer
  • When adapting graphs for slides,
    6·1 answer
  • The following slide was created as part of a presentation that trains new employees how to use the scheduling and calendar softw
    14·2 answers
  • Shortest Remaining Time First is the best preemptive scheduling algorithm that can be implemented in an Operating System.
    7·1 answer
  • Create a Python program by defining a function that calculates the year of birth of a person whose age is known to you.(You may
    7·1 answer
  • Which of the following is a correct statement about writing down passwords on a ""cheat sheet?""
    7·1 answer
  • Heads or tails
    11·1 answer
  • Why is it important to enforce access controls and to keep logs regarding who has access to data closets
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!