1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pie
3 years ago
8

Application area of word processor?​

Computers and Technology
2 answers:
kompoz [17]3 years ago
7 0

Answer:

  1. Typing, editing,and printing different types of document .
  2. Formatting text, paragraph , pages for making attractive document .
  3. Checking spelling and grammar of document for making it error free.
  4. Inserting and editing pictures , objects, etc.
  5. Adding watermark , charts , quick flip, etc.
sashaice [31]3 years ago
6 0
Word Processing is using a computer to create, edit, and print documents. Of all computer applications, word processing is the most commonly used. To perform word processing - a computer, word processing software and a printer are required.
Word processing software enables the user to do the following:
1. To create a document
2. Store it electronically on a USB or on a computer
3. Display it on a screen
4. Modify or format it by entering commands and characters from the keyboard
5. Print the document on a printer

Word processors can create multiple types of files, including text files (.txt), rich text files (.rtf), HTML files (.htm & .html), and Word files (.doc & .docx). Some word processors can also be used to create XML files (.xml).

A word processor should not be confused with a text editor, such as Notepad, that only allows editing and creating plain text documents.
You might be interested in
Which of the instances below is an example of a Trojan horse? Question 2 options: a) An attachment in an email that is really a
sergij07 [2.7K]

Game-theif Trojans is the malware that makes a backdoor into your email account by which you are playing a game or has downloaded it and thus by this all information of user is exposed.

So option D is the answer.

Option A cannot be answer because Trojan does not use files for its purpose.

Option B cannot be a good option because Trojan works in online could.

Option C cannot be a option because Trojan does not need executable to attack your account.

3 0
3 years ago
Read 2 more answers
How many bits can a memory chip with the below configuration support? For full credit, show how you got the answer.
tatiyna

Answer:

Total Memory= 4 KB = 4096 bytes = 32768 bits

Explanation:

<em><u>1. Data lines are 8 From D0 to D7</u></em>

so

Total memory at single address locations is 8 bits.

<em><u>2. Address lines are 12 (A0 to A11)</u></em>

There are 12 address lines but 3 out 12 are for selction of chip or memory bank.

so only 9 pins are there to address the locations on one chip.

Total No. of address locations on single chip = 2^9 = 512 locations

as 1 location is 1 byte so total memory of single chip is 512 bytes.

<u><em>3. Total Memory Bank </em></u>

There are total 3 selection pins for memory bank.

so

Total chips = 2^3 = 8.

<em><u>4. Total Memory </u></em>

Total size of 1 chip = 512 bytes

Total size of 8 chip = 8x512 bytes = 4096 bytes = 4096/1024 kb = 4 kb

<em>So total memory of system is 4 Kb = 4096 bytes = 32768 bits</em>

5 0
3 years ago
Differences between placeholders and textbook in PowerPoint ​
Igoryamba

Answer:

fifthly, if it is an empty box. it disappear completely. sixth the size of a text box changes depending on the length of a text that we type . this is in contrast with a place holder box where changes are made of the font of the text

Explanation:

mark me a brainlist

4 0
3 years ago
Who elso does their online school in their bed cause i do
Katen [24]

Answer:

yeah same

Explanation:

3 0
3 years ago
Read 2 more answers
What is the database used for
ELEN [110]
Sometimes referred to as database management systems<span>, database software tools are primarily used for storing, modifying, extracting, and searching for information within a database. </span>
7 0
3 years ago
Other questions:
  • Which component of a computer is its input device and what role does it play in a document?
    6·1 answer
  • Which of the following statements about websites is NOT true?
    8·2 answers
  • Annalise received financial aid offers from two universities. Financial Analysis for Option A Costs per Year Financial Aid Packa
    8·2 answers
  • Write a method drivingCost() with input parameters drivenMiles, milesPerGallon, and dollarsPerGallon, that returns the dollar co
    12·1 answer
  • I am in school what should i do i am 15
    5·2 answers
  • A form of encryption that uses only one key to encrypt and decrypt a file. This is a less
    14·1 answer
  • A constructor must have a return statement.<br><br> True<br><br> False
    14·2 answers
  • Need help with Python coding from Zybooks...
    9·1 answer
  • What are the steps to view two different versions of the same document at once? 1. Go to the File tab on the ribbon. 2. Select T
    6·1 answer
  • 2. Cryptography relies on open standards - a protocol or standard that is publicly available. Why are open standards necessary
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!