1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cestrela7 [59]
3 years ago
15

Widow in respect to word processing ​

Computers and Technology
1 answer:
SVEN [57.7K]3 years ago
3 0

Answer:

To use the word widow.

Explanation:

She became a widow at the age of 95, due to the passing of her husband by natural causes.

You might be interested in
If the user enters any operator symbol other than , -, *, or /, then an UnknownOperatorException is thrown and the user is allow
Anna007 [38]

Answer:

Explanation:

The following code is written in Java. It creates the UnknownOperatorException class and catches it if the user enters something other than the valid operators. If so it continues asking the user for a new input. Once a valid operator is entered, it exits the function and prints the operator.

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

       char symbol = askForOperand();

       System.out.println("Operand: " + symbol);

   }

   public static char askForOperand() {

       Scanner in = new Scanner(System.in);

       try {

           System.out.println("Enter operator symbol: ");

           char symbol = in.nextLine().charAt(0);

           if ((symbol != '-') && (symbol != '*') && (symbol != '/')) {

               System.out.println(symbol);

               throw new UnknownOperatorException();

           } else {

               return symbol;

           }

       } catch (NumberFormatException | UnknownOperatorException e) {

           System.out.println("Not a valid operand");

           char symbol = askForOperand();

           return symbol;

       }

   }

}

class UnknownOperatorException extends Exception {

   public UnknownOperatorException() {

       System.out.println("Unknown Operator");

   }

}

7 0
3 years ago
Why would someone need to use tools like IECacheView or MyLastSearch on a system? Do companies have the right to search a workst
natali 33 [55]

IECacheView helps a user quickly and easily access and read the cache folder of Internet Explorer. Information such as filename, content type, number of hits, expiration time, and the full path of cache filename can be accessed. With all this information, investigators can look at what users are accessing on the web. Anything accessed on IE by an employee at his or her workstation can be searched by the company. This brings us to the question; do companies have the right to search a workstation they issued to their employees using IECacheView?

In my own opinion, I honestly think that it is not right to search an employee’s workstation using IECacheView or any other tool whatsoever. Under the law, employees have reasonable rights to privacy. These rights prevent employers from searching their employees. Unless there is evidence of computer crimes or misconduct, employees have a greater expectation of privacy

6 0
4 years ago
Your mom is trying to save room on her hard drive and wants to uninstall some of her applications. She asks you how to do this.
Olegator [25]
Press on an application, and press Ctrl and D together on a keyboard which means delete or unistall.
Is the answer supposed to be more specific?
3 0
3 years ago
Read 2 more answers
Shaniya has misspelled a scientific name in her biology report. She needs to correct it, but she has no access to a computer. Sh
Brums [2.3K]

yes, she can make an account or log onto her school account

7 0
3 years ago
Read 2 more answers
Is the ability to choose the start and finish times, but they must complete a full day’s work
Hatshy [7]
Yes ma’am , can of spam. what she said up there ^*
4 0
3 years ago
Other questions:
  • What was the name of the first computer (machine) language?
    5·2 answers
  • Splunk In most production environments, _______ will be used as the source of data input?
    12·1 answer
  • What device copies system files
    14·1 answer
  • PLZ HELP ME!!!
    13·1 answer
  • Which 2 processes are operational processes
    10·1 answer
  • You learned that you can use the tags to insert a link to another webpage. One problem that webpage developers face is that, aft
    10·1 answer
  • How is hashing used?
    6·1 answer
  • Logistic Regression is a type of __________ problem.
    13·2 answers
  • What is the importance of server modules and add-ons?
    9·1 answer
  • Private notes about individual slides that you leave for yourself or for others who might use the presentation file is called __
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!