1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bogdanovich [222]
2 years ago
13

Some one help pls will mark brainless !!!!!

Computers and Technology
1 answer:
Bess [88]2 years ago
5 0
Adobe photoshop- creating and editing

microsoft word- creating and editing word documents

adobe indesign- layouts

qaurk- publishing
You might be interested in
In Secure Electronic Transaction, the purpose of Dual Signature is to link two messages that are intended for two different reci
Margaret [11]

Answer:

The analysis of the question is summarized in the following explanation.

Explanation:

  • The dual signature would be intended as a connector for both signals, we can clearly distinguish between the transmit antennas by delivering each statement with such a separate signing, thus making the linkage of certain messages possible via the World wide web.
  • No violation of the records allows data easily accessible to a third party so we can improve the safety of 2 statements linking, because nobody can identify how the data have been authenticated as well as how the text could be decrypted to gather intelligence.

3 0
2 years ago
Which nmap switch is used to detect target OS and services?<br> a -S<br> b -p<br> c -F<br> d -A
antiseptic1488 [7]

Answer:

d -A

Explanation:

The -S switch is used to use a fake source address, and it can mask your ip.

The -p switch is used to indicate which ports you want to scan, because then it searches for all open ports it searches for that one specifically

The -F switch is used as the quick scan mode, scanning the surface

The -A switch is used to check the operating system.

3 0
3 years ago
How do computers perform complicated tasks built from simple instructions?
wlad13 [49]
They use and perform a set of actions and programs that build on each other.
8 0
3 years ago
Quick!!!!!
Vlad [161]

Answer:

B. the current affairs page

Explanation:

it's a simple question

8 0
3 years ago
Read 2 more answers
If you want to wrap text so that it fits a particular cell, which formatting section would you use?
Nataly_w [17]
<h2>Alignment section helps to wrap text in Excel</h2>

Explanation:

  • Alignment section available in Home ribbon has many option such as aligning the text to left, right, center.
  • It also has options to rotate the selected text diagonally, vertically, etc.
  • The user can also merge two or more cells and do necessary alignment
  • When it comes to wrapping the text, texts are wrapped when the count of letters exceeds the width of the cell. Excel has "Wrap text" option to wrap the word to the next line.

5 0
2 years ago
Other questions:
  • Read the spreadsheet formula below, then answer the question.
    14·2 answers
  • Which technology was used in fourth generation of computer​
    13·2 answers
  • If you have a charger that’s not from Apple, then could that damaged your iPhone or not?
    5·1 answer
  • A powerful computer that acts as a hub for other computers is a called a ______.
    6·2 answers
  • Which wireless communication technology is most likely used when synchronizing device information to an automobile?
    9·1 answer
  • DTE just installed 500kW of solar capacity on the MCCC campus. the cost of the installation was about $3 million. what was the c
    10·1 answer
  • The data-mining technique that creates a report or visual representation is _____.
    13·1 answer
  • Public class Square extends Shape{
    13·1 answer
  • Drag the tiles to the correct boxes to complete the pairs.
    13·1 answer
  • _____ is rampant with bugs and shortcomings because most programmers do not know how or do not take the time to incorporate secu
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!