1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nataliya [291]
2 years ago
14

I’ll mark brainlest

Computers and Technology
2 answers:
Alchen [17]2 years ago
8 0

Answer:

the answer is file and page design

faust18 [17]2 years ago
3 0

<u>Home </u><u>and</u><u> Insert</u>

In Microsoft office, to create a text box you will go to insert and then there will be various options there and you will see text box marking. so you will just have to click on text box and you can create it however you want to do it.

It's such a easy step(◕ᴗ◕✿)

You might be interested in
A single set of hardware, software, databases, telecommunications, people, and procedures that are configured to collect, manipu
jok3333 [9.3K]

Answer:

"Computer Based Information system (CBIS)" is the correct answer for the above question.

Explanation:

  • CBIS means about that system that is used to produce the information or process the information and it is computer-based because CB stands for computer-based and IS stands for an information system.
  • It means that a system that helps by the computer and it is used to process the information then it can be called CBIS.
  • To process the information in a computer system there is a need for software, people, database, hardware and processor which is a set of CBIS.
  • The above question also wants to ask about the system which is a set of software, people, database, hardware and processor then it is known as CBIS which is described above. Hence the answer is CBIS.

4 0
3 years ago
Which type of computer are todays most widely used personal computers?
iris [78.8K]

Answer:

Windows 10. :)

Explanation:

8 0
3 years ago
Read 2 more answers
Primary U.S. interstate highways are numbered 1-99. Odd numbers (like the 5 or 95) go north/south, and events (like the 10 or 90
Norma-Jean [14]

Answer:

The C code for the problem is given below

Explanation:

#include <stdio.h>

int main() {

   int highwayNumber;

   int primaryNumber;

   scanf("%d", &highwayNumber);

   if (highwayNumber >= 1 && highwayNumber <= 999) {

       if (highwayNumber <= 99) {

           if (highwayNumber % 2 == 0) {

               printf("I-%d is primary, going east/west.\n", highwayNumber);

           } else {

               printf("I-%d is primary, going north/south.\n", highwayNumber);

           }

       } else {

           primaryNumber = highwayNumber;

           highwayNumber %= 100;

           if (highwayNumber % 2 == 0) {

               printf("I-%d is auxiliary, serving the I-%d, going east/west.\n", primaryNumber, highwayNumber);

           } else {

               printf("I-%d is auxiliary, serving the I-%d, going north/south.\n", primaryNumber, highwayNumber);

           }

       }

   } else {

       printf("%d is not a valid interstate highway number.\n", highwayNumber);

   }

   return 0;

}

4 0
3 years ago
Read 2 more answers
PP 11.1 – Write a program that creates an exception class called StringTooLongException, designed to be thrown when a string is
Scrat [10]

Answer

The answer and procedures of the exercise are attached in the following archives.

Step-by-step explanation:

You will find the procedures, formulas or necessary explanations in the archive attached below. If you have any question ask and I will aclare your doubts kindly.  

6 0
3 years ago
List and briefly describe passive and active security attacks.
Rama09 [41]

Answer:

Passive security attack are the unauthorized disclosure in the network attack. In this type of security attack a system are use for monitoring and sometimes scanning the open port. It basically include the monitoring the unprotected data and traffic analysis.

On the other hand, active security system modify the transmitted data and gain the unauthorized access from the computer system.

This type of security attack basically monitor the file transfer and electronic mail from the attacks which can be pass in the form of viruses in the computer system.

4 0
3 years ago
Other questions:
  • When performing conflict management, it is important to identify your;
    6·1 answer
  • What is output when the CarTest application is run? Why?
    11·1 answer
  • Green field country is planning to conduct a cricket match between two teams A and B. a large crowd is expected in the stadium a
    6·1 answer
  • PLEASE HELP!!!!
    6·2 answers
  • Assume that you want two C# or C++ programs to share some data. You can write the first program so that it writes it's output to
    5·1 answer
  • write query for all products reutrn product name with its amounts due, paid, canceled, and refunded, order the result by product
    7·1 answer
  • Write a description of the photograph to someone who cannot see the photograph. Be sure to include the title of the photograph a
    5·1 answer
  • Help? Can you explain what this mean?
    7·1 answer
  • You will need to convert the following binary numbers to hexadecimal. Table 1 contains 16 problems. The first one is completed f
    7·1 answer
  • Smallest kind of computer
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!