1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gladu [14]
3 years ago
8

How is knowing how to use word or docs importamt?

Computers and Technology
1 answer:
ollegr [7]3 years ago
3 0
For 90% of users, the word processing capabilities of Google Docs is more than enough. But for some, Microsoft Word's advanced features will be important. ... You also get far more powerful templates, which could speed up your work, depending on what you use Word for.
You might be interested in
____________ signs, as discussed by Charles Peirce, involve an "existential" relationship between the sign and the interpretant.
astraxan [27]

Answer:

Indexical Signs

Explanation:

According to Charles Peirce, when there is "existential" relationship that exist between the sign and interpretant, then indexical signs are involved. This implies that at some point in time, they have existed at the same time or in the same place. One indexical sign of a human being is Fingerprints. However, photographs are classified as indexical signs testifying that at some moment, the camera was present.

8 0
3 years ago
ASAP PLS I DON T HAVE ENOUGH TIME
velikii [3]

Answer:

The font-style property allows you to make text appear italicized (i.e. sloped, or slanted).

em {

 font-style: italic;

}

Explanation:

This property accepts one of three possible values: normal, italic, and oblique.

If a given font family has an italic or oblique face embedded, the browser will select that face. If no italic or oblique face is available, the browser will mimic the sloping effect. If italic is defined and there is no italic face available, the browser will look for an oblique face before it tries to mimic the italic. The same applies to oblique; it too will look first for an italic face.

To prevent the browser from adding a mimicked, or synthesized, version of the italic or oblique face, you may use the font-synthesis property (if supported).

8 0
2 years ago
The letters a, e, i, o and u are the only vowels. Write a function named vowelUseDict() takes a string t as a parameter and comp
Andru [333]

Please specify the programming language.


3 0
4 years ago
LITERALLY PLS ANYONE!!! 90 pointsss!
Doss [256]

7. Intentional Virus Setting is when you the user purposely spread computer viruses in order to do harm. It should be noted that this is highly illegal (no duh) with a sentence of up to 10 years and $250,000 in penalties assuming you are convicted under the Computer Fraud and Abuse Act of 1986 here in the States.

8. intrusion of solitude, appropriation of name or likeness, public disclosure of private facts, and false light.

9.  Intentionally creating and/or sending a virus and infecting people's computers is against the law, and can result in jail time or a fine.

10. Some examples are: Deception - Lying about how information will be used. Violation of confidentiality - Disclosing someone's personal information without consent. Intrusion - Interference in an employee's personal life. Misappropriation - Using a person's likeness to promote a product without his consent.

11. Everyone wants PRIVACY for themselves, and everyone wants ACCOUNTABILITY from others. Privacy is a basic human need, and invasion of privacy can have serious psychological and emotional consequences, including paranoia, anxiety, depression and broken trust. Invasion of privacy is both a legal and an ethical issue.

12. A cause of action for invasion of privacy entitles the plaintiff to recover damages for the harm to the particular element of his or her privacy that is invaded. Thus, one who suffers an intrusion upon his or her solitude or seclusion, may recover damages for the deprivation of his or her seclusion.

13. An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet. Many businesses and educational facilities require that employees or students sign an acceptable use policy before being granted a network ID.

14. Intellectual property refers to creations of the mind: inventions; literary and artistic works; and symbols, names and images used in commerce. Intellectual property is divided into two categories: Industrial Property includes patents for inventions, trademarks, industrial designs and geographical indications.

PLEASE PLEASE PLEASE HELP WITH MY RECENT!!!!!!

btw hope this helps if it does please make brainliest :)

6 0
3 years ago
Read 2 more answers
What does it mean by “Your circles should shrink by half” sorry if this isn’t a clear picture.
damaskus [11]

Answer:

I'm not seeing anything so sorry

5 0
3 years ago
Other questions:
  • The wires that transfer data across the motherboard are known as the
    9·1 answer
  • Given an integer variable bridgeplayers, write an statement that increases the value of that variable by 4.
    9·1 answer
  • What was the Messana conflict
    7·1 answer
  • The voluntary linkage of computer networks around the world is called the ______.
    7·1 answer
  • Which of these converts analog audio signals into digital codes in a computer?
    5·2 answers
  • IN JAVA Write a program with total change amount as an integer input that outputs the change using the fewest coins, one coin ty
    15·1 answer
  • What does it mean when your phone says system ui has stopped?
    7·1 answer
  • Data are made anonymous by Destroying all identifiers connected to the data. Requiring all members of the research team to sign
    6·1 answer
  • In this section, you will use a stack to implement a program that checks if a string is balanced. Use the skeleton code provided
    5·1 answer
  • Linux distributions automatically come with a native software firewall.TrueFalse
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!