1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotegsom [21]
3 years ago
10

1) It is possible to email a document directly from the Word application. O FALSE O TRUE

Computers and Technology
1 answer:
QveST [7]3 years ago
8 0

Answer:

True

Explanation:

You might be interested in
Application software developed by the user or at the user’s request is called ____ software.
Zolol [24]
End-User Software. Because it is not professional

4 0
3 years ago
Password procedures, information encryption software, and firewalls are examples of measures taken to address:
Gnoma [55]
<span>Password procedures, information encryption software, and firewalls are examples of measures taken to address are all measures taken to safeguard information security and protect users data from being tampered or manipulated by invaders. 

In web, if we leave our information without encryption or if we leave our system without firewall, different types of security threats might arise: such as, information being hacked, manipulated or sent to wrong places. To avoid this information encryption is done. We might also need to firewall our system so that we can avoid unwanted access and invading of our privacy using malwares and other tools. </span>
5 0
3 years ago
PLEASE HELP!!! 18 points
sdas [7]

Answer:

Vertigo                                            |     1958 |      128 | English         | 1958-08-24 | UK

   902 | The Innocents                                      |     1961 |      100 | English         | 1962-02-19 | SW

   903 | Lawrence of Arabia                                 |     1962 |      216 | English         | 1962-12-11 | UK

   904 | The Deer Hunter                                    |     1978 |      183 | English         | 1979-03-08 | UK

   905 | Amadeus                                            |     1984 |      160 | English         | 1985-01-07 | UK

   906 | Blade Runner                                       |     1982 |      117 | English         | 1982-09-09 | UK

   907 | Eyes Wide Shut                                     |     1999 |      159 | English         |            | UK

   908 | The Usual Suspects                                 |     1995 |      106 | English         | 1995-08-25 | UK

   909 | Chinatown                                          |     1974 |      130 | English         | 1974-08-09 | UK

   910 | Boogie Nights                                      |     1997 |      155 | English         | 1998-02-16 | UK

   911 | Annie Hall                                         |     1977 |       93 | English         | 1977-04-20 | USA

   912 | Princess Mononoke                                  |     1997 |      134 | Japanese        | 2001-10-19 | UK

   913 | The Shawshank Redemption                           |     1994 |      142 | English         | 1995-02-17 | UK

   914 | American Beauty                                    |     1999 |      122 | English         |            | UK

   915 | Titanic                                            |     1997 |      194 | English         | 1998-01-23 | UK

   916 | Good Will Hunting                                  |     1997 |      126 | English         | 1998-06-03 | UK

   917 | Deliverance                                        |     1972 |      109 | English         | 1982-10-05 | UK

   918 | Trainspotting                                      |     1996 |       94 | English         | 1996-02-23 | UK

   919 | The Prestige                                       |     2006 |      130 | English         | 2006-11-10 | UK

   920 | Donnie Darko                                       |     2001 |      113 | English         |            | UK

   921 | Slumdog Millionaire                                |     2008 |      120 | English         | 2009-01-09 | UK

   922 | Aliens                                             |     1986 |      137 | English         | 1986-08-29 | UK

   923 | Beyond the Sea                                     |     2004 |      118 | English         | 2004-11-26 | UK

   924 | Avatar                                             |     2009 |      162 | English         | 2009-12-17 | UK

   926 | Seven Samurai                                      |     1954 |      207 | Japanese        | 1954-04-26 | JP

   927 | Spirited Away                                      |     2001 |      125 | Japanese        | 2003-09-12 | UK

   928 | Back to the Future                                 |     1985 |      116 | English         | 1985-12-04 | UK

   925 | Braveheart        

Explanation:

hope this helped please mark me branliest let me know if you have questions :)

5 0
3 years ago
In Java, when a numeric variable is concatenated to a String using the ____, the entire expression becomes a String. a. string s
Anon25 [30]

Answer:

b) Plus sign

Explanation:

The plus sign or addition operator (+) accomplishes concatenation. This is a greatly used in the Java's output Statement to combine values coming from different data types into a formatted output

consider the code snippet below  which uses concatenation to output information about an individual

public class Name {

   public static void main(String[] args) {

   int age =18;

   String name = "John";

       System.out.println("His name is "+name +" and his age is "+age);

   }

}

The + operator has been used to concatenate the int value age and the String value stored in name to the output

5 0
3 years ago
What are the two options for adding a new slide into presentations?
nirvana33 [79]
The first being Ctrl+M and the second being clicking the <span>top half of the New Slide button</span>
5 0
3 years ago
Other questions:
  • 2. Write the binary representation of number 1037.379 in IEEE 754 standard in single precision. Express the result in binary, oc
    7·1 answer
  • When writing test methods, what functionality is verified by the system method "runAs()"?
    7·1 answer
  • Which utility would you use to test communication on your own computer using your ip address as a parameter?
    10·1 answer
  • Formatting. Given input that represents a floating point number, that is, made up of digits and at least one decimal point, conv
    15·1 answer
  • The term computer ________ is used to describe someone who is familiar enough with computers to understand their capabilities an
    12·1 answer
  • What happens when a flash memory card is installed in a slot and it is recognized by windows?
    6·1 answer
  • Suppose that the following elements are added in the specified order to an empty binary search tree: Kirk, Spock, Scotty, McCoy,
    12·1 answer
  • How many total bits are required for a direct mapped cache with 16 KB of data and 4 word blocks Assuming a 32 bit address
    12·1 answer
  • What would be the best tool to display the following information from a basketball game?
    6·1 answer
  • When heading styles have been applied to a document, the user has the option to navigate through the document using which tab on
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!