1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
d1i1m1o1n [39]
3 years ago
8

Decribe the advantages of using emails compared with physical faxing ?

Computers and Technology
1 answer:
fredd [130]3 years ago
6 0

Answer:

email is SO much faster

Explanation:

You might be interested in
________________, _______________ and ___________ are what you see when you open Excel
jolli1 [7]

Answer:

Columns, rows and cells.

Explanation:

Generally, workbooks are known as Microsoft Excel files. Excel workbook can be defined as a collection of one or more charts and worksheets (spreadsheets) used for data entry and storage in an excel file. In order to create a project on Excel you will have to use a workbook.

A spreadsheet can be defined as a file or document which comprises of cells in a tabulated format (rows and columns) typically used for formatting, arranging, analyzing, storing, calculating and sorting data on computer software applications such as Microsoft Excel.

Columns, rows and cells are what you see when you open Excel. They are typically used for holding various variables that are to be processed into useful informations. Columns are the vertical sections of a workbook while the horizontal sections are referred to as rows. These columns and rows are formed by cells, in which data are inputted.

6 0
3 years ago
A type of touch screen that can be up to four feet by six feet is a(n) _____. plasma screen multitouch interface Electronic Pape
zlopas [31]
<span>a multi touch interface</span><span />
5 0
3 years ago
Read 2 more answers
Which category does this fall in identity theft​
g100num [7]

Answer:

A crime.

Explanation:

It's illegal.

8 0
3 years ago
A bastion host allows the firewall to connect to the internal network and the perimeter network.TrueFalse
Delicious77 [7]

Answer: True

Explanation:

 Yes, the given statement is true, as the bastion host basically require two individual firewall that connect with the internal network and perimeter network by using the perimeter configuration.

Perimeter network basically isolate the the bastion host from the internal network. Bastion host is the serve as the host that connect with the external world. As, perimeter network is one of the type of the firewall network system.

Therefore, the internal network and the perimeter network basically connect with the firewall by using bastion host.

3 0
3 years ago
It is difficult to use screening questions in computer-assisted surveys. <br> a. True <br> b. False
Sedbober [7]
This is FALSE

Apart from the traditional pen and paper methods, there is an increased emergence of tools that can be used in market and public opinion research. For instance, we can use computer assisted telephone interviews, self-administered computer methods and computer assisted face to face interviewing methods



5 0
3 years ago
Other questions:
  • Discus the pros and cons of Internal cloud service and External cloud service for both Infrastructure as a service and Applicati
    11·1 answer
  • Describe three main types of testing and the order in which they are performed.
    9·2 answers
  • If you've been a victim of identity theft, what should you do after contacting the company that reported the suspicious charge a
    9·1 answer
  • After an informative session, you find yourself with several pages of notes. For maximum retention and understanding, you should
    6·1 answer
  • Buenas , ayudenme con esta tarea de excel 2016
    6·1 answer
  • To more easily incorporate methods into a program, it is common practice to store methods in their own classes and files. Then y
    6·1 answer
  • How do you change your grade level
    10·1 answer
  • There are many best practices for digital recordings. Select the three best practices from the list below. select the best micro
    14·1 answer
  • How do you convert an algorithm to make it possible for a computer to read
    6·1 answer
  • Three types of query​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!