1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ghella [55]
3 years ago
8

What processing software enables the user to

Computers and Technology
1 answer:
Dafna11 [192]3 years ago
6 0

Answer:

I think its B

Explanation:

software enables users to create and edit documents.

You might be interested in
Lucy is trying to decide what sources to use in her literature review. The type of sources Lucy will use in her literature revie
timama [110]

The type of sources Lucy will use in her literature review will depend on the type of literature review and the discipline.

<h3>What is in the literature review?</h3>

A literature review is known to be a form of a detail summary of former research on a topic.

Note that the literature review is one that looks into scholarly articles, books, area of research and as such, the type of sources Lucy will use in her literature review will depend on the type of literature review and the discipline.

Learn more about literature review from

brainly.com/question/13708299

#SPJ1

7 0
2 years ago
HELP PLSS‼️ Which are the following are considered peripherals? Mark all that are correct
My name is Ann [436]

Answer:

Speaker, Keyboard, Monitor, Mouse

Explanation:

A peripheral device is used to put input into (or receive output from) a computer. Parts of a computer wouldn't be considered peripheral.

5 0
3 years ago
You are responsible for tech support at your company. You have been instructed to make certain that all desktops support file an
lesya692 [45]

Answer:

The file system that we shall choose is NTFS file system.

Explanation:

NTFS file system is a file system developed by Microsoft that provides file system encryption. Encryption means to secure our data in such a way such that only authorized person's can have access to it. NTFS file system allows to encrypt data so that all our data is safe from various cyber related thefts thus making our system and data safe from vulnerability of theft.

Encryption does not prevent access to data but the data that is accessed by various agents remains meaningless to all the agents until the user of the data decrypts it.

3 0
4 years ago
13. A 2-sided coin has an equal likelihood of landing on each side. One side is called "heads" and the other is called "tails".
serious [3.7K]

Answer: c

Explanation:

only reasonable answer

7 0
3 years ago
How the (i)?? Help me to slove this
cupoosta [38]

Answer:

#include <fstream>

 ifstream inFile("bookBorrower.txt");

 ofstream outFiles ("overPayment.txt");

Explanation:

fstream has ifstream and ofstream for input and output, respectively.

4 0
2 years ago
Other questions:
  • Nila has created a report, and now she would like to a create table of contents. Nila has reviewed her report and decides to add
    9·1 answer
  • The primary role of the firewall is to: block unauthorized access to and from the system. quarantine any malware until it can be
    11·1 answer
  • I really love my voice when not recorded. Now when I record my voice, I feel like its high pitched and horrible. Do I really sou
    11·1 answer
  • Write any two rule of function​
    10·1 answer
  • Which of these best represents a call to action?
    7·2 answers
  • True or False: Mapping annotations are exclusive - an annotated method will only be accessible to requests sent to a matching UR
    14·1 answer
  • Mr. O would like to purchase a new computer for his home business. Mr. O's current computer runs very slow when he is running e-
    5·2 answers
  • Cuales fueron las consecuencias que creo el storm worm (gusano storm, el informatico)??
    5·1 answer
  • For python how do I ask the user how many numbers they want to enter and then at the ending add those numbers up together?
    10·1 answer
  • Your connection to this site is not secure how to fix.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!