1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
denis-greek [22]
3 years ago
12

In order to restrict editing to a document, a user will go to Review, , Restrict Editing, and will then select what kinds of edi

ting are allowed.
Computers and Technology
1 answer:
KiRa [710]3 years ago
3 0

Answer: drafting

Explanation:

You might be interested in
I need help pleaseeeeeee!
sertanlavr [38]

Answer:

located on the x axis

the x axis is horizontal and y axis vertical

8 0
3 years ago
Read 2 more answers
01:24:3
bogdanovich [222]

Answer:

1. Uncompressed audio formats

2. Formats with lossless compression

3. Formats with lossy compression

Explanation:

1. Uncompressed audio formats, such as WAV, AIFF, AU or raw header-less PCM;

2. Formats with lossless compression, such as FLAC, Monkey's Audio (filename extension .ape), WavPack (filename extension .wv), TTA, ATRAC Advanced Lossless, ALAC (filename extension .m4a), MPEG-4 SLS, MPEG-4 ALS, MPEG-4 DST, Windows Media Audio Lossless (WMA Lossless), and Shorten (SHN).

3. Formats with lossy compression, such as Opus, MP3, Vorbis, Musepack, AAC, ATRAC and Windows Media Audio Lossy (WMA lossy).

8 0
4 years ago
In this laboratory, we are going to maintain a username-password system by storing the usernames and passwords in a file. The fi
Dominik [7]

Answer:

Explanation:

ok i will do it for ya

5 0
3 years ago
Suppose you are implementing the address book feature for a cellphone. The address book needs to be kept sorted by person’s last
NemiM [27]

Answer:

Sorted linked list

Explanation:

  • A sorted linked list can be used for sorting the last name and support fast access while queried by the last name.
  • The hash table cannot be used because it could have a problem if there would be more buckets to handle than the expected.
  • The binary search table is implemented as the hash table hence both will give the same results.
8 0
3 years ago
Which BEST describes how the author’s purpose is revealed? A) The speaker appeals to the emotions of the audience in section 10.
tatiyna

You probably meant languge arts not Tech.

Anyways I will not be sure unless I read the book but..C most of the time is correct sooo sorry I can't help much unless I read the book

I would suggest <u>B) The speaker appeals to the emotions of the audience in section 9.</u>

<u />

I'm also sorry that I'm late but I hope someone else who searchs this up can use this

<u></u>

<u>Sorry If I'm wrong</u>

8 0
3 years ago
Other questions:
  • If I put a short clip from a copyrighted video to Facebook and make it only viewable to friends, is that illegal?
    12·1 answer
  • Select the correct statement about data preparation.
    10·1 answer
  • Which of the following agricultural clusters would require administrative and financial training? biotechnology agribusiness sys
    8·1 answer
  • Should a social network own our social data? Is it an invasion of privacy for social networks to collect and use the information
    6·1 answer
  • Which fraction represents the shaded part of this circle? 1 2 O 4 Check Answer /3rd grade/​
    14·2 answers
  • Factors to consider when selecting an operating system to install in a computer ​
    7·1 answer
  • Que es un proyecto técnico?
    9·2 answers
  • 8.
    9·1 answer
  • Explain two ways that you can create a header.
    14·1 answer
  • The success of Eye of the storm exemplifies
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!