1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tangare [24]
2 years ago
14

Which of the following is not a method for opening Word software?

Computers and Technology
2 answers:
neonofarm [45]2 years ago
8 0

Answer:

right clicking on the desktop and clicking "view"

kati45 [8]2 years ago
4 0

Answer:

veiw

Explanation:

Microsoft Windows, commonly referred to as Windows, is a group of several proprietary graphical operating system families, all of which are developed and marketed by Microsoft. Each family caters to a certain sector of the computing industry

You might be interested in
Can you please help on number 1 and 2?
Pavel [41]

Answer:

1 is 3 and 2 is 1

Explanation:

4 0
3 years ago
There is overlap in the subjects of study in the different information technology disciplines. true or false
OlgaM077 [116]

The question statement is true that there is overlap in the subject of study in different information technology discipline.

It is true that there is overlap in the subjects of study in the different information technology disciplines. The disciplines are collectively known as the disciplines of computing. Computer science, computer engineering, information technology, information systems, and software engineering all come in the realm of computing disciplines. These are the five distinct computing disciplines with overlapping subjects of study.

These disciplines are said to be interrelated as computing is their main area of study, yet they are distinct since each has its own curricular focus, research perspective and career prospects.

  • Computer science: Computer science as the discipline deals with designing and implementation of operating systems and software, including the study of computation and computability.
  • Computer engineering: As a discipline, computer engineering concerns with making different parts of computers work together. Research, design and development of computer-based equipment and hardware are also area of study in this discipline.
  • Information technology: Information technology as an area of study is mainly concerned with automation of business operations. It provides support through software and computers to handle data and innovate business processes.
  • Information systems: Information system as a discipline provides area of study which makes people able to apply advance information technology to solve today’s problem primarily within an organizational and enterprise settings.
  • Software engineering:  Software engineering is the discipline concerns with the designing, development, maintenance, testing, and evaluation of computer software and applications to solve real world problems.

You can learn more about information technology at

brainly.com/question/14688347

#SPJ4

7 0
1 year ago
What best compares potrait and landscape orientations
REY [17]
In portrait  the height is taller than its wide and in landscape the height is smaller than wide
so its the wider and taller
5 0
3 years ago
The function takes two string parameters; the first is the name of a file and the second is text. Complete the function to appen
castortr0y [4]

Answer:

The code for the function is given below in Python language

Explanation:

def append_string_to_file(filename, text):// function takes the filename // and text  to append

f = open(filename, 'a')

f.write(text) //function part that writes the text

f.close() //closing the file using the explicit close function

3 0
3 years ago
I NEED HELP SOMEONE HELP ME PLEASE
kirill115 [55]
1. non photorealistic rendering
2. siftables
3. spherical audio
4. blu ray
7 0
2 years ago
Other questions:
  • Which of the following is a collection of honeypots used to present an attacker aneven more realistic attack environment?a. Padd
    6·1 answer
  • Hackers who gain control over several computers can organize them into a client-server network known as a(n) __________ . This n
    7·1 answer
  • opy the code below into the coderunner window. Debug the code so that it outputs the verses correctly. a = input("Enter an anima
    14·1 answer
  • When working with arrays, most programming languages perform ________, which means they do not allow programs to use invalid sub
    5·1 answer
  • True or False: When you share something on a friend’s Timeline, only that friend can see it.
    5·2 answers
  • Coal, nuclear and natural gas power plants all transform thermal energy into electricity
    14·2 answers
  • Ivan wants to have code in a game that will make it possible to change the speed of a swimmer in the game. Which of these does I
    8·1 answer
  • 5.7 AP-Style MC Practice edhessive
    14·1 answer
  • Who is your favorite person from squid game?
    13·2 answers
  • what extension of nat allows several hundred workstations to access the internet with a single public internet address
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!