1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RUDIKE [14]
3 years ago
7

Microsoft Word cannot be used to create personalized web pages. OTrue False

Computers and Technology
1 answer:
Georgia [21]3 years ago
5 0

Answer:

False

Explanation:

Because Microsoft can be used to create personalized web

You might be interested in
What is technology? *
natta225 [31]

Answer: All of the above is the answer

4 0
3 years ago
Ok so this isn’t really a question that is for school but...
Nastasia [14]

Answer:

u shoud just keep it ;-;

Explanation:

5 0
3 years ago
A(n)__________is a confirmed event that compromises the confidentiality, integrity, or availability of information. a. operation
Vladimir79 [104]

In information security, a breach is a confirmed event that compromises confidentiality, integrity, or availability.

<h3>What is a breach?</h3>

A breach occurs when an obligation or promise is not fulfilled. An act of breaking laws, rules, contracts, or promises; a violation of the basic laws of humanity; a violation of a law; a breach of a promise. The factions hoped to avoid a break in relations; "they hoped to avoid a break".

Therefore, the option C, which is our answer.

To learn more about breach, here

brainly.com/question/13885689

#SPJ1

8 0
2 years ago
Explain how increasingly standardized data, access to third-party datasets, and current trends in hardware and software are coll
SashulF [63]

Answer and Explanation:

The information revolution has had profound impacts on decision-making allowing more informed decision as a result of "stone throw" information reach- in our pockets, the desk, the TV, and the vast number of technologies that make this possible.

Standardized data which involves data formatted to bring uniformity and be easily understood and compared by programs and people , access to rich, outsider dataset and less tasking and flexible plus powerful programming have all contributed to empowering another time of information driven decision-making that are less prone to errors and mistakes.

8 0
4 years ago
How do you send a word document email???
suter [353]

for a word document in an email, you open email and click on the paperclip, then go into your files and find the word document (save it first) then click on that and write the email and send it.
4 0
4 years ago
Other questions:
  • A dmz is a subnet of _____________ accessible servers placed outside the internal network.
    10·1 answer
  • What are three ways you cite evedince
    5·2 answers
  • A user logging on, an application server connecting to a database server, an authentication server rejecting a password, or an a
    12·1 answer
  • In what order does the air flow in a canister vacuum cleaner pass through the following components?
    11·1 answer
  • A user is trying to log into windows on her notebook computer. she enters the correct password for her user account, but the sys
    14·1 answer
  • The various protocols in use on the internet are said to operate in layers in which the protocol(s) at each layer solve one prob
    5·2 answers
  • What feature do you need on a computer if you want to take it on vacation to another continent?A. Dual-voltage selector switch B
    10·1 answer
  • Which of the following statements is FALSE?
    5·1 answer
  • Create a high-level plan to perform a gap analysis for Fullsoft Inc
    7·1 answer
  • A user logs in to a virtual world and creates an animated character representing themselves, which they then use to move through
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!