1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erik [133]
3 years ago
11

Which document would be best created using Word online

Computers and Technology
2 answers:
AnnZ [28]3 years ago
7 0

Answer:

c

Explanation: I took the test

topjm [15]3 years ago
6 0
Resume       
You might be interested in
Suppose there are 69 packets entering a queue at the same time. Each packet is of size 7 MiB. The link transmission rate is 1.7
svp [43]

Answer:

69.08265412 milliseconds

Explanation:

Lets first convert 7 MiB to bits

7*1024*1024*8=58720256 bits

Now convert bits to Gbits

58720256/10^{9}  =0.058720256 Gbits

Queuing Delay = Total size/transmission link rate

Queuing Delay= \frac{0.058720256}{1.7} =0.03454132706 seconds

Delay of packet number 3 = 0.03454132706*2=0.06908265412 seconds

or 0.06908265412= 69.08265412 milliseconds

7 0
4 years ago
When setting quotas for disk space, what are the two tools for enabling and configuring quotas? and which of the two are the mor
lora16 [44]
NTFS quotas
File server resource manager.

A system admin has rights to set NTFS quotas if he or she is concerned with some users monopolizing a small amount of disk space. Activating NTFS quotas helps set a storage limit for users using a particular volume. Out of the two, file server resource manager is the most effective and flexible. It is best recommended to use file server resource manager if you need quotas. It comes with file-type filtering and includes folder-level quotas.
8 0
3 years ago
Va rog ajutatima !!!!!!! aicea trebue cu cangorou de facut si cu cit
Alexandra [31]

Answer:

hwhwjbshsjwja jwjwjw

Explanation:

ywgav

4 0
3 years ago
What are the Technical Skills do Penetration Testers need to have?
Alla [95]

1. Tester should understand the vulnerability of the system because by this skill it should be able to secure the system for the parts where the attacks can be done.

2. Understand the web technologies and communication techniques of them because the two way communication understanding is one of the most important skill a tester should have so that he/she should have a proper image of what the system doing and how it is doing it.

3. Ability yo code scripts and most importantly understand them because while testing there are many script code to be read and understand for any bug or error the system is facing.

5 0
3 years ago
You can use the results from a search on a database in all of these ways except to ____.
Oksanka [162]
<span>Hello </span><span>Savonahdeedss4938
</span><span>

Answer: You can use the results from a search on a database in all of these ways except to create records


Hope this helps
-Chris</span>
4 0
3 years ago
Read 2 more answers
Other questions:
  • What does a server do? *
    11·1 answer
  • A personal computer system is composed of the processing unit, graphics board, and keyboard with reliabilities of 0.976, 0.785,
    8·1 answer
  • Based upon the contents of the BOOKS table, which line of the following SQL statement contains an error?
    13·1 answer
  • What determines the color of a rock?
    11·2 answers
  •  How does critically analyzing technology add value to interactions with people in personal and professional contexts?
    7·2 answers
  • What is information associated with a document to help describe that document called?
    14·1 answer
  • Which part of the Word application window should the user go to for the following activities?
    14·1 answer
  • Match each label to the correct location on the image match the process to its characteristics
    14·1 answer
  • To create a cell reference in another spreadsheet you must need to start with _______ sign.
    14·1 answer
  • Jason is using his mother's computer. He plugs in his flash drive, but it does not appear in the explorer window. Suggest what J
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!