1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cestrela7 [59]
3 years ago
15

Widow in respect to word processing ​

Computers and Technology
1 answer:
SVEN [57.7K]3 years ago
3 0

Answer:

To use the word widow.

Explanation:

She became a widow at the age of 95, due to the passing of her husband by natural causes.

You might be interested in
Whose job is it to ensure that a group stays focused and on schedule?
topjm [15]

\text{Hello There!}

\text{The job of the facilitator is often to organize group activities.}

\bold{Therefore,\;your \;answer \;is\;going\;to\;be\;A, the\;facilitator.}

\huge\text{I hope this helped! :)}

\rule{250}{1.5}

5 0
3 years ago
The ________ utility automatically creates duplicates of your libraries, desktops, contacts, and favorites to another storage lo
umka21 [38]

Answer: File History

Explanation: File history is the history that gets created in the form of back-up that keeps the record of the stored files. It is used in protecting the files  that is present on the system like desktop, libraries,etc.

It creates the duplicate records in the storage for any future use and it can also be restored easily.File history also facilitates with feature of deleting the unnecessary history afterward when the user wants.

6 0
2 years ago
Write a program whose input is a string which contains a character and a phrase, and whose output indicates the number of times
otez555 [7]

Answer:

The program written in python is as follows

def countchr(phrase, char):

     count = 0

     for i in range(len(phrase)):

           if phrase[i] == char:

                 count = count + 1

     return count

phrase = input("Enter a Phrase: ")

char = input("Enter a character: ")

print("Occurence: ",countchr(phrase,char))

Explanation:

To answer this question, I made use of function

This line defines function countchr

def countchr(phrase, char):

This line initializes count to 0

     count = 0

This line iterates through each character of input phrase

     for i in range(len(phrase)):

This line checks if current character equals input character

           if phrase[i] == char:

The count variable is incremented, if the above condition is true

                 count = count + 1

The total number of occurrence is returned using this line

     return count

The main method starts here; This line prompts user for phrase

phrase = input("Enter a Phrase: ")

This line prompts user for a character

char = input("Enter a character: ")

This line prints the number of occurrence of the input charcater in the input phrase

print("Occurence: ",countchr(phrase,char))

4 0
3 years ago
Which scenario is most likely due to an everyday problem rather than a
tester [92]

The scenario is most likely due to an everyday problem rather than cultural difference among people collaborating online is option D. A team member's bandwidth is limited, and the video feed keeps freezing.

<h3>What is collaborating online?</h3>

Online collaboration is known to be a term that connote the use the internet as well as other forms of online tools to be able to work together on some work or project.

Note that it is one that is done Instead of a person sitting in a physical office space, the online collaboration gives room for employees to be able to work together from different locations and tech by accessing the virtual work environments as well as other shared online workspaces.

Therefore, The scenario is most likely due to an everyday problem rather than cultural difference among people collaborating online is option D. A team member's bandwidth is limited, and the video feed keeps freezing.

Learn more about collaborating online from

brainly.com/question/514815

#SPJ1

6 0
1 year ago
Problem 1 (Authentication): Consider the following authentication protocol, which uses a classical cryptosystem. Alice generates
Elis [28]

Answer:

Check the explanation

Explanation:

Yes, going by the question above, the protocol validates Bob to Alice for the reason that the key is only shared between Bob and Alice as well as the number which is being sent randomly. Therefore the invader won’t be able to predict and response to that number. Because of the authentication protocol, that makes use of a classical cryptosystem thereby resulting into the possibility of an argument such that key finding is attainable via invader.

5 0
3 years ago
Other questions:
  • A patent facilitates a government-approved technological monopoly by
    5·1 answer
  • Array A is not a heap. Clearly explain why does above tree not a heap? b) Using build heap procedure discussed in the class, con
    15·1 answer
  • I have been trying to work on this for a while now, and this is on excel
    11·1 answer
  • Match the spreadsheet features with their respective descriptions.
    9·2 answers
  • What values can represent a bit
    8·1 answer
  • Which are examples of types of audio media that can support a presentation? Check all that apply.
    14·2 answers
  • Which of the examples is part of client-side code?
    12·1 answer
  • Do you think lossy compression formats will be popular in 20 years? Why or why not?
    10·1 answer
  • How many atoms of oxygen in 4 molecules of HN03​
    12·1 answer
  • The diagram shows the positions of the Sun, Earth, and Moon during each moon phase. When viewed from Earth, at what point does t
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!