1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cestrela7 [59]
3 years ago
15

Widow in respect to word processing ​

Computers and Technology
1 answer:
SVEN [57.7K]3 years ago
3 0

Answer:

To use the word widow.

Explanation:

She became a widow at the age of 95, due to the passing of her husband by natural causes.

You might be interested in
The ____ is composed of tabs, each containing groups of related commands.
Mashutka [201]
Ribbon im pretty sure is your answer
3 0
4 years ago
What is a good practice to remember when adding transitions to a presentation?
storchak [24]

Answer:

A. Use one type of transition throughout.

Explanation:

Edge 2021.

7 0
3 years ago
Read 2 more answers
30 POINTS FOR THE ANSWER
vladimir2022 [97]

The possible solutions are:

  • Ask for a printed or click on proof to get the  right color match.
  • One can use Pantone colors as it aids with color matching.

<h3>How do one do the above?</h3>

Computers is known to often use the same data and it often uses it to bring up clarity or light up pixels on its screen.

Therefore to get the result above, one need to check system preference system setting to get different brightness and color settings.

Therefore, The possible solutions are:

  • Ask for a printed or click on proof to get the  right color match.
  • One can use Pantone colors as it aids with color matching.

Learn more about printed colors from

brainly.com/question/1548113

#SPJ1

4 0
2 years ago
Which issue of computer ethics is concerned about the technological division in the society?​
Molodets [167]

Answer:

There are many legal and ethical issues with computers that can be exploited by bad people to do bad things. Some of those issues include illegal music and video file downloading, spyware, identity theft, phishing, keystroke logging, packet sniffing and cyberbullying

7 0
3 years ago
Read 2 more answers
Assume the secret key is: (1, 2, 3, 4) -&gt; (3, 1, 4, 2); assume the plaintext THEYLOVEIT. If the sub-block length is 3, what i
Alex777 [14]
I belive their were answer chocies to this question am i right 

8 0
3 years ago
Other questions:
  • In Word you can _____ or merge two different copies of the same document into one document. a. replicate b. duplicate c. copy d.
    11·1 answer
  • Tyler trades in a car worth $5,000 (wholesale) on a new $15,000 car, but still owes $7,000 on his old car. How much will he owe
    12·1 answer
  • Enrico waited ten years to file a cause of action against Frederico for a breach of contract claim. Frederico can use ______ as
    8·1 answer
  • how do I comment on answers? there's one answer I'm confused about but I don't know how to comment on it
    7·2 answers
  • The benefits of flextime include:
    11·2 answers
  • Help me please............
    6·2 answers
  • When workers use techology to work from home or an office center, they are
    7·2 answers
  • In what tab can a user find the workspace option?
    8·1 answer
  • Input an int greater than 0 and print every multiple of 5 between it and 0 inclusive in descending order. If the number is not g
    13·1 answer
  • What are real online jobs any one of any age can get pays weekly by Pay<br> Pal
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!