1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lozanna [386]
3 years ago
5

Choose the list of the best uses for word processing software.

Computers and Technology
1 answer:
Ann [662]3 years ago
4 0

Answer:

book reports, letters to your friends, resumes, and contracts

Explanation:

You might be interested in
In response to an alert regarding a possible security incident, you are analyzing the logs for a web application. In the process
SOVA2 [1]

The type of attack was most likely attempted against the application is an  XSS attack.

<h3>Why is the above an  XSS attack?</h3>

This attack is known to be an example of an XSS attack as it is one that is often recorded by the log of a web server's log.

Conclusively, Note that in this attack, if you see the HTML encoding, one can say that is mainly an XSS attack but when you see SQL or XML statements in the string, then it is another.

Learn more about attack from

brainly.com/question/76529

#SPJ1

4 0
2 years ago
What kind of heat we feel from the sun
ivolga24 [154]

Is it solar heat? ultraviolet heat? UV?
6 0
4 years ago
Read 2 more answers
Where can you apply the hand wire splicing technique
Ber [7]

Answer:

When you want to extend an electrical wire for an apparatus, e.g., a lamp or a speaker.

3 0
3 years ago
How many errors are in the following formula?
finlep [7]

there are about two errors in the formula


4 0
3 years ago
How can you refer to additional information while giving a presentation? will help you emphasize key points on a specific slide.
ozzi

Explanation:

1. welcome your audience and introduce yourself.

2. capture their attention

3. identify your number one goal or topic of presentation.

4. give a quick shout out line of your presentation.

5.

candidates should identify at least three different types of information in any one presentation from text, drawing, images, tables, video ,audio .

5 0
3 years ago
Other questions:
  • ICS encourages jurisdictions to use common terminology. Common terminology:
    10·1 answer
  • Anna is looking for a job. Which two types of skills would she find necessary to secure a job?
    10·1 answer
  • Juan is interested in getting a job in the technological field. He is interested in protecting data from threats, and stopping h
    9·1 answer
  • How to change the date modified on a word document?
    11·1 answer
  • Sometimes when a baby is born they need to be kept in an incubator for a period of time. A manufacturer would like to design a n
    11·1 answer
  • Kareem is working on a project for his manager. He has a few questions for a co-worker who he knows is knowledgeable on the subj
    7·1 answer
  • The Excel application is used to create
    7·1 answer
  • Can rank u r guys in rocket leagye
    13·1 answer
  • The best team in nba like right now
    8·2 answers
  • In what type of attack does the adversary leverage a position on a guest operating system to gain access to hardware resources a
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!