1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lana66690 [7]
3 years ago
15

What is a word processor write any five important features of word processor?

Computers and Technology
1 answer:
SSSSS [86.1K]3 years ago
6 0

Answer:

Word processor is application software. It provides useful tools for creating all kinds of text documents. It can also be used to create documents for publishing on the World Wide Web.

<em>FEATURES:</em>

<em>File management</em>

<em>Font  Specification</em>

<em>Table of context and indexes</em>

<em>Macro</em>

<em>Spell Checker</em>

<em>Explanation:</em>

You might be interested in
why are microphones or digital cameras unlikely to cause the damage that is found in repetitive strain injury?
sveta [45]
Because these devices do not require the repetitive motion that cause the damages.
5 0
3 years ago
7.1 What is the basic building block of an 802.11 WLAN? 7.2 Define an extended service set. 7.3 List and briefly define IEEE 802
Black_prince [1.1K]

Answer:

7.1)

BSS (Basic Service Set) is a basic building block of  802.11 wireless LAN.

It is the wireless station that executing the similar competing and the MAC protocol for accessing a similar wireless system is shared.

7.2)

The Extended Service Set is one of the basic components of IEEE 802.11 WLAN architecture which increases the mobility range to the individual BSS (Basic Service Set).

An ESS is the set that contains two or more than two Basic Service Sets

that forms an individual sub-network.

7.3)

The IEEE 802.11 service has the MAC layer implement which falls in two categories:

  1. Service Station.
  2. Distribution System Service.

Service Station - 802.11 standard has defined the services which is providing the functions among the stations.

It includes the following components:

  • Authentication
  • Deauthentication
  • Privacy
  • MSDU delivery.

Distribution System Service - It defined by the 802.11, provides the functionality across the distribution system and access point also provides the DSS.

It includes the following components:

  • Association  
  • Disassociation  
  • Distribution  
  • Integration  
  • Reassociation.

7.4)

It either may be or either not be a wireless network.  

Because distribution system has these three things:

  • Wired network
  • Wireless network
  • A switch

7.5)

Association agrees on the set security capabilities to use.

It also allows the mobile node which has made the transition to identifies itself to the AP (Access Point) within a BSS so that's why the nodes can be participated in the data exchanges with  another mobile nodes.

7.6)

The IEEE 802.11i are addresses the three types of security areas:

1) authentication,

2) key management,

3) data transfer privacy.

7.7)

7 0
3 years ago
Which of the following is a principle that can improve the efficiency of I/O?
natulia [17]

Answer:

C)

Explanation:

One principle that can improve the efficiency of I/O would be to move processing primitives into hardware. Primitives are a semantic value representing something else such as words or numbers within the programming language. By moving them into hardware they system is able to read them at a much faster speed making the I/O more efficient.

5 0
3 years ago
Read 2 more answers
While designing a website, a(n) ____ allows you to identify the specific amount of space used on a particular page before it con
Aleks [24]
The answer would be A: wireframe, im pretty sure...

Hope this helped!! :)

8 0
3 years ago
Read 2 more answers
What would be the result of sending the string AAAAAAAAAAAAAAAAAAAA into a variable that has allocated space for 8 bytes
DerKrebs [107]

The result of sending the string above into a variable that has allocated space for 8 bytes is that there will be Buffer Overflow Attacks.

<h3>What occurs when a string of data  sent to buffer is large?</h3>

A buffer overflow is also known as buffer overrun. This  is known to be a process that occurs when or if  the size of data is known to be more than the storage capacity of any kind of memory buffer.

Note that due to the overload, the program that is trying to write the data to the buffer will therefore overwrites to the adjacent memory locations.

Learn more about string from

brainly.com/question/26427527

4 0
3 years ago
Other questions:
  • Which is the most likely problem with a static layout?
    5·2 answers
  • What is the purpose of a title slide? A) To add titles to each slide B) To introduce the presentation C) To describe the resolut
    12·2 answers
  • The process of sending ping requests to a series of devices or to the entire range of networked devices is called a:
    9·1 answer
  • Which of the following functions sends the the GPA entered by the user to the calling function? A. def get_gpa(): gpa = float(in
    8·1 answer
  • What do character formats do for your document's message? A. Set how text aligns within a document B. Provide organization C. Pr
    6·2 answers
  • Which resource hels a user access a could service​
    12·1 answer
  • Which position most likely requires your Master's Degree for success
    7·1 answer
  • What is difference between reserved and user defined word
    9·1 answer
  • The contribution of Charles Babbage in the history of computer​
    6·1 answer
  • True/false questions are useful in determining a student’s ability to____information
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!