1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pychu [463]
2 years ago
13

Helppppppppppppppppppppppppppppppppp

Computers and Technology
2 answers:
saw5 [17]2 years ago
8 0

Answer:

word processor........type a business letter

fax machine.........send a copy of documents to another office

Natalija [7]2 years ago
6 0

Answer:

answer below

Explanation:

hope this helps

You might be interested in
Write a program that will ask user to enter your name and count number of character ?
Svet_ta [14]

Answer:

672

Explanation:

because

8 0
3 years ago
Which of the following protocols is used by Web servers to establish communication between a web page and a web browser?
Iteru [2.4K]
HTTP or HTTPS is most likely the answer you are looking for.
6 0
3 years ago
Question 12
AlladinOne [14]

Which is a multicast address ?

ans: 241.2.2.1

6 0
2 years ago
Which form of malware contains hidden code that is triggered by meeting or reaching a specific condition? (A) Trap door (B) Viru
Alborosie

Answer:

D- Trojan Horse

Explanation:

Trojan horse is a malware that has hidden code and look legitimate in order to damage or transfer harmful action on the computer.

Example hackers can disguise as Trojan horse by spying on the victims computer in order to gain access to sensitive data on the computer over the network.

3 0
2 years ago
In which utility is the file search option found in windows
OLEGan [10]

Press Windows logo key + X Key.

Click on Control Panel.

Double Click on Troubleshooting.

Click on View all option, on left hand side of the window.

Click on Search and indexing and follow the on screen instructions.

5 0
3 years ago
Other questions:
  • EASY AND I GIVE BRAINLIEST!!! What is a good jeopardy question about operating systems?
    6·1 answer
  • Assume the following JavaScript program was interpreted using staticscoping rules. What value of x is displayed in function sub1
    12·1 answer
  • Use the SQL Server Management Studio to complete the following.
    9·1 answer
  • Which of the following actions might contribute to recommendations you see online?
    6·1 answer
  • A field with the extend data type can contain an attached file, such as an image, document, chart, or spreadsheet.
    6·1 answer
  • ____ is the most widely used language for writing system software because it combines the power of a high-level language with th
    12·1 answer
  • A database planner names a field “Organic ingredients_3”. Why would this name Create possible problems in programming?
    8·2 answers
  • Something I should look for when trying to decide if a source is credible is the publication's ....
    10·1 answer
  • This is for C++: Using a nested for loop output the following pattern to the screen:
    12·1 answer
  • What type of software is an antivirus?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!