1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
serg [7]
3 years ago
7

Margie has found a stock template to use. She changes a few things about the formatting and then saves the

Computers and Technology
2 answers:
asambeis [7]3 years ago
6 0

Answer:

file open my documents

Explanation:

because if she saved it she would have to go to her documents to open it

OLga [1]3 years ago
4 0

Answer:

I listened to the other person and got the question WRONG. Had I gotten that question right I would have ended with all A's this semester. So thanks a lot and the answer is File, New, My Templates

Explanation:

You might be interested in
What is the size of the key space if all 8 characters are randomly chosen 8-bit ascii characters?
Slav-nsk [51]
21...............................
4 0
3 years ago
If you press the Tab key when you're in in the last cell of a table,
KengaRu [80]
The answer is B.

If you press the tab key when you're in the last cell of a table, you will add a new blank row
8 0
3 years ago
Read 2 more answers
A chief Information Security Officer (CISO) is performing a BIA for the organization in case of a natural disaster. Which of the
nataly862011 [7]

Answer:

The correct answer is option (D) Identify the impact on safety of the property

Explanation:

Solution

In every Business Impact Analysis, the first and the most important step is for the CISO is to identify and estimate the impact of the aftereffects on the business and property of an organization that may be occurred from the disaster.

Physical security is very important, but it is not noticed by most organizations. It is important if you do not want anyone to take  away your information or destroy it, in case of natural calamity. the reason could be that, the intruder is  doing it for his personal achievement, financial gain,or seeking revenge or when one is taken unaware and becomes a target. If this security is not maintained properly all the safety measures will not be useful once the attacker gets through by gaining physical access.

Example of property can be software, equipment, facilities, company’s assets.

4 0
3 years ago
What are some of the strategies that you use for confronting a complex problem and breaking it down into smaller pieces? How mig
bazaltina [42]

Answer:

Breaking it down I guess for me, you could take down all the possible things that you could do. Eliminating things, one by one. It could help working on a computer by not letting yourself get over-whelmed by all your programming and thinking "alright, this THEN this."

Explanation:

8 0
3 years ago
How do individuals differ in terms of their ability to process information?
Alla [95]
Oh that is easy first they differ the therms of their ability and that helps them process the information ( sorry for doing that lol)
5 0
3 years ago
Other questions:
  • The ________ utility automatically creates duplicates of your libraries, desktops, contacts, and favorites to another storage lo
    7·1 answer
  • How can you make a circle in JavaScript? Thank you!
    9·1 answer
  • Threads can only be added to cylindrical faces.<br> O True<br> O False
    5·1 answer
  • An Oven Is Just A Spicy Refrigerator? Yes Or No??
    9·2 answers
  • Mario makes a check payable to "cash," intending to withdraw money from his bank. Kirby takes the check from Mario's notebook an
    10·2 answers
  • Which of the following variable names is not valid? 1price 1 price price 1 price1
    15·2 answers
  • In Microsoft Word you can access the _______ command from the "Mini toolbar". A. insert citation B. save as C. underline D. word
    11·2 answers
  • Ethical design refers to...
    13·1 answer
  • Defination of formula bar​
    14·1 answer
  • Which terms would be found in search for "Mo*”? Check all that apply.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!