1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitrij [34]
3 years ago
9

What is a document you can create with word-processing software

Computers and Technology
1 answer:
madam [21]3 years ago
6 0

Answer:

Word processing software can easily create, edit, store, and print text documents such as letters, memoranda, forms, employee performance evaluations (such as Appendix A), proposals, reports, security surveys (such as Appendix B), general security checklists, security manuals, books, articles, press releases, and ... I think the answer is this

You might be interested in
"a web client that connects to a web server, which is in turn connected to a bi application server, is reflective of a"
Bingel [31]

The web client that connects to a web server, which is in turn connected to a bi-application server, is reflective of a one-tier architecture.

<h3>What is a website?</h3>

A website is a collection of web pages and related material that is published on at least one server and given a shared domain name.

A one-tier architecture is reflected in the web application that connects to a web server, which is coupled to a bi-application server.

Thus, the web client that connects to a web server, which is in turn connected to a bi-application server, is reflective of a one-tier architecture.

Learn more about the website here:

brainly.com/question/19459381

#SPJ4

8 0
2 years ago
It is recommended that systems administrators analyze logs in order to determine if they have been altered because monitoring ca
Virty [35]

Log server can be used to assemble logs from platforms throughout the network.

<h3>Log server</h3>

A server log is a log file (or several files) automatically created and maintained by a server consisting of a list of activities it performed.

It maintains a huge server requests, information about the request, including client IP address, request date/time, the page requested, HTTP code, bytes served, user agent, and referrer are typically added to the log server format.

Server logs typically do not collect user-specific information.

Find out more on Log server at: brainly.com/question/19057393

5 0
3 years ago
Which of these are the two main components of a CPU?
Mrrafil [7]

Answer:

Control unit and Arthemitic logic unit

plz mark me as brainlist

7 0
3 years ago
Read 2 more answers
Which term describes a process by which malicious code can enter from a non-secure network, and make a hairpin, or sharp turn, a
lidiya [134]

Answer:

The correct answer to the following question is Hairpinning.

Explanation:

Hairpinning is the returning message from one origin end-point and back in that direction from where it came, as the way to get it to the destination end-point.

All the conventional telephones systems use both digital and analog hairpinning connections.

In the VoIP (Voice over Internet Protocol), the hairpinning can be avoided and the two endpoints are connected after call has been initiated. This form of communication has following call setups which is called as shuffling.

5 0
3 years ago
What is the complete predicate in the sentence below? Looking up from his computer monitor, Jason mopped his brow, exhaled sharp
frozen [14]

Answer:

A. mopped his brow, exhaled sharply, and picked up his phone.

Explanation:

Predicate in a sentence talks about the actions relating to the subject of the sentence, Here, The complete predicate is option A.mopped his brow, exhaled sharply, and picked up his phone. because they were the actions performed by the subject (John) the subject in a sentence usually refers to the person, place, thing, etc (Noun).

3 0
3 years ago
Other questions:
  • Write a program to read-in a sequence of integers from the keyboard using scanf(). Your program will determine (a) the largest i
    8·1 answer
  • 7-eleven had to file for a bankruptcy. However they become a profit making company after installing an Information System that a
    12·1 answer
  • Can you answer your own question on brainly?
    12·2 answers
  • If the point (9, 5) is translated 6 units left and 5 units up, then find the
    10·1 answer
  • Step 1: Configure the initial settings on R1. Note: If you have difficulty remembering the commands, refer to the content for th
    10·1 answer
  • You want a class to have access to members ofanother class in the same package. Which is themost restrictive access that accompl
    11·1 answer
  • PLEASE HELP ME FIX THIS CODE.
    10·1 answer
  • An algorithm whose worst-case time complexity is bounded above by a polynomial function of its size is called a(n)
    13·1 answer
  • TRUE OR FALSE
    14·1 answer
  • Intro Programming - Problem(s)
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!