1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erik [133]
3 years ago
11

Which document would be best created using Word online

Computers and Technology
2 answers:
AnnZ [28]3 years ago
7 0

Answer:

c

Explanation: I took the test

topjm [15]3 years ago
6 0
Resume       
You might be interested in
The pseudoinstructions that are available in an assembly language programming environment usually found in the Select one: a. CP
mafiozo [28]

Answer:

b

Explanation:

CPU manual provides guides to use a CPU.

Assembler manual provides guide on how to use an assembler and so is the case for compiler.

For a particular machine, it set of instructinos are available with the programmer.

6 0
2 years ago
Sidney works in the accounting department. His boss just assigned him a task that involves creating budget formulas for the comp
madreJ [45]
In excel spreadsheets, Sidney need to consider specifying relationships between the information you have stored in your spreadsheets when creating formulas. The elements that will help you understand using spreadsheet are the constants, operators, references and functions. This will enable her to use the formulas, without hassle in spreadsheets.
6 0
2 years ago
PLEASE HELP ME! Will report ignorant answers!
kaheart [24]

Answer:

It is important so your computer can function properly. the two things that might happen if they are not compatible are that it might crash your computer and that your computer might not function properly.

5 0
2 years ago
Put your snap in the comments below if you want to be friends
jok3333 [9.3K]

Answer:

I don't have S nap, but my ensta is  brandnewmillennium

Explanation:

4 0
2 years ago
Read 2 more answers
\what security countermeasures can you enable on your wireless access point (wap) as part of a layered security solution for wla
dmitriy555 [2]
The security countermeasure that one can enable on a wireless access point as part of the layered solution for WLAN implementations would be to disable 802.1x . It is the one that provides a WEP and is very unsecure. Another is to change the SSID and to set the broadcast of the SSID to off.
5 0
3 years ago
Other questions:
  • Which of the following statements regarding EFT is false? EFT still requires the endorsement of a check EFT allows payment to be
    11·1 answer
  • CodeHS 3.4.5. What is the code for four colored triangles.
    8·1 answer
  • How can the use of new technology in industry benefit the us government
    8·2 answers
  • The administrators of Tiny College are so pleased with your design and implementation of their student registra- tion and tracki
    13·1 answer
  • I need help 50 points and brainless if you answer
    7·1 answer
  • Fern has set up a computer network for the entire building. Unfortunately, the signal strength diminishes as it reaches toward t
    8·1 answer
  • Can you anyone please help me​
    13·1 answer
  • Plz plz plz subsribe to my channel, CookieFunTime
    9·1 answer
  • Discussion Topic
    11·1 answer
  • Write a c program that reprints input so that no line is longer than 50 characters. Specifically, for lines less than or equal t
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!