Microsoft® Publisher does which of the following?

Question 2 options:

Receives email messages


Keeps daily activity records


Creates items using page layout skills


Sends email messages

Answers

Answer 1

Answer:

Creates items using page layout skills

Answer 2

Page layout skills are basically used in the creation of items using the Microsoft Publisher software. The correct option is C.

What is Microsoft Publisher?

Microsoft Publisher is a desktop publishing programme that differs from Microsoft Word in that page layout and graphic design are prioritised above text creation and editing.

It is a tool that aids in document creation for use in a professional setting. These include, for example:

Newsletter.Postcards.Flyers.Invitations.Brochures

To accomplish this, the user must first choose one of Microsoft Publisher's pre-built templates, edit it with text and images, and then print the document.

So, Microsoft Publisher cannot be used to send or receive messages or to keep daily records. Instead, it's designed to produce things using page layout expertise.

Thus, the correct option is C.

For more details regarding Microsoft Publisher, visit:

https://brainly.com/question/10015755

#SPJ6


Related Questions

The _____, also known as the system chassis, is a container that houses most of the electronic components that make up a computer system.

Answers

Answer:

I am pretty sure it is the RSA

Explanation:

What is the relationship between a condition and an action?

A. The program creates its own conditions, and lets you choose which action to take.

B. The program performs an action, which changes all conditions.

C. The program checks to see if a condition is met, and if so, it performs an action.

D. The program checks to see if any actions are occurring, then randomly sets a condition.

Answers

The answer is C , The program checks to see if a condition is met and if so it performs an action!

A Chief Security Officer (CSO) has asked a technician to devise a solution that can detect unauthorized execution privileges from the OS in both executable and data files, and can work in conjunction with proxies or UTM. Which of the following would BEST meet the CSO's requirements?
A. Fuzzing.
B. Sandboxing.
C. Static code analysis.
D. Code review.

Answers

A solution which would best meet the CSO's requirements is: B. Sandboxing.

What is a sandbox?

A sandbox can be defined as an isolated environment in a computer system or on a network that is designed and developed to mimic end user operating system (OS) and environments, so as to detect unauthorized execution privileges from the operating system (OS).

In cybersecurity, sandboxing is typically used to safely execute suspicious code and data files without causing any harm to the host device or network. Also, sandboxing can work in conjunction with proxies or unified threat management (UTM).

Read more on sandboxing here: https://brainly.com/question/25883753

In order to communicate over the Internet computers send small bits of data called ______ to eachother.

Answers

Answer:

communication

Explanation:

............

Which of these is a possible disadvantage of working with a team?

more individual control over the final product


risk of private information becoming known


diverse perspectives and ideas


less need to communicate
pls help

Answers

Answer:

risk of private information becoming known

Explanation:

Just did it!

the chart is located on tab​

Answers

Answer:

Yes , the chart is located on tab.

Explanation:

#Carryonlearning

The FastEthernet 0/0 interface on a switch is currently disabled. You need to enable it so a workstation can be connected. Drag the command on the left to the appropriate configuration step on the right to accomplish this. Enter global configuration mode, Enter interface configuration mode, Enable the interface, Verify the interface is disabled.

Answers

The appropriate configuration step and command to connect a workstation to the switch are:

Enter global configuration mode: config t.Enter interface configuration mode: int fa0/0.Enable the interface: no shut.Verify the interface is disabled: show interface status

What is a command?

A command can be defined as a set of instructions that are typically used to configure a network device such as a switch, so as to enable it perform certain tasks automatically during network communication.

In Computer networking, commands can be used to ensure the interfaces (ports) on a switch are active and open for connections from other network devices such as:

WorkstationRouter

Read more on switch here: https://brainly.com/question/13243868

coding is..? i need help pls reply quick

Answers

Answer: Code is made up of a series of steps that instruct computers on how to perform a specific task.

Explanation: Computer software, games, apps, and websites can all be created using coding. A programmer is a person who is responsible for writing the programs that drive everything we do on a computer.

How to get the id of a document in firebase in react.

Answers

Answer:I don’t know

Explanation:yea I don’t know you can get caught

Explain the terms Tags and Attributes.

Answers

Answer:

a tag is a way of representing an HTML element in the program, while an attribute is a way of describing the characteristics of an HTML element.

Explanation:

Answer:

A tag is a way of representing an HTML element in the program, while an attribute is a way of describing the characteristics of an HTML element.

how is an inventory of activities different from an inventory of objects?

Answers

The inventory of activities different from an inventory of objects because inventory of activities involves a record of business routine activities , while inventory of objects allows identification and recovery of an object.

What is inventory of activities and an inventory of objects

The inventory of activities entail the record of business routine activities, this could be last purchase of supplies.

The inventory of objects  on the other hand is about identification and recovery of an object and with this Inventories are detailed.

Learn more about inventory at;

https://brainly.com/question/25818989

How do you flatten a 2D array to become a 1D array in Java?

Answers

Answer:

With Guava, you can use either

int[] all = Ints.concat(originalArray);

or

int[] all = Ints.concat(a, b, c);

Explanation:

Use GUAVA

. When you ____________________ a word, you can use a single line, a double lines, a dotted line, or even a wavy line!

Answers

Answe
That is the answer just had that

__________ allows an issuer to access regional and national networks that connect point of sale devices and bank teller machines worldwide.

Answers

Answer:

EFT

Explanation:

out of

A. EFT

B. ATM

C. POS

D. ALF

EFT is the answer

Payment gateway allows an issuer to access regional and national networks that connect point of sale devices and bank teller machines worldwide.

What is. payment gateway?

A payment gateway is a technology or service that enables merchants or issuers to connect their point of sale (POS) devices and bank teller machines to regional and national networks.

It allows the processing of electronic transactions, such as credit card payments, by securely transmitting transaction data between the merchant, the issuing bank, and the acquiring bank.

Payment gateways provide the infrastructure for authorizing, capturing, and settling payment transactions, facilitating seamless and secure communication across various networks and financial institutions.

learn more about Payment gateway: https://brainly.com/question/31465886

#SPJ2

Which type of password attack employs a list of pre-defined passwords that it tries against a login prompt?.

Answers

That is calld a bruteforce attack

The goal of the step of the etl process is to take the source data from all the various sources and convert it into a single format suitable for processing.

Answers

It should be noted that goal of the Transform step of the ETL process is to take the source data from all the various sources and convert it into a single format.

What is ETL?

ETL,  can be explained as data integration process which make use of data from multiple data sources into a single one.

It stands for;

extract transformload,

It turns all the various sources and convert it into a single format.

Learn more about ETL at;

https://brainly.com/question/24313597

Which one of these is least like the others javascript ruby python mysql.

Answers

MySQL is a relational database management system based on the structured query language, JavaScript, Ruby and Python are programming languages ​​used largely in web development.

What is MySQL?

It is a system that allows database management, that is, it is a database query language that is used to define relational database structures.

Characteristics of MySQL

The system works on the client-server principle, where the server represents the actual database management system and is responsible for storing and distributing the data.

It can be used on Windows, Linux, Unix and some other operating systems.

Therefore, we can conclude that MySQL is a relational database management system based on the structured query language, JavaScript, Ruby and Python are programming languages ​​used largely in web development.

Learn more about MySQL here: https://brainly.com/question/4964005

Biometric authentication can’t be reset. TRUE or FALSE

Answers

Answer:

True

Explanation:

Once it's breached, it's breached forever

lmk if this helps

The _____________ display alerts for your device and all the apps in the slider pan on the right side of the desktop

Options:
1. Tablet Mode
2. Action Center
3. Task View

Answers

Answer:

In this case it would be the touch bar,but based off of your answers here, it would be 3) Task view.

Explanation:

On certain computers, like my Chromebook, you can adjust the settings to where your apps are on the left or right side of the screen, whether it be in tablet mode or desktop mode.  

Which feature of a lyric poem does the repetition of the word let best illustrate?

Answers

Answer:

Alliteration.

Alliteration is the repetition of words or sounds through a poem to make it sound more fluent. Like rhyming words.

"The town was really eerie, then it got really dreary, then the town is weary"."Mouse and mice, they like to eat cheese. Their cheese is shaped like dice, then they see some bees, now they're on the run."

Hope this helps!

can you edit header or footer? if yes, how​

Answers

Answer:

It depends on the type of document you are trying to edit, but normally you can edit the header/footer.

Explanation:

For docs, you just double click near the top/bottom of the page.

When you delete a file or folder in windows what happens to it.

Answers

Answer: When you delete a file, Windows removes the pointer and marks the sectors containing the file's data as available. From the file system's point of view, the file is no longer present on your hard drive and the sectors containing its data are considered free space.

Explanation:

What's a big question or problem in the tech field you'd like to solve and why?

Answers

A big question or problem in the tech field that i would like to solve is Data security.

What is Data security ?

Data security  can be regarded as process of protecting data from unauthorized user as well as protection from  data corruption .

I will like to solve this problem because as advances in technology, the data of individual or organization is not been total secured and this is posing so much loss to individuals.

Data security are;

data encryption hashing tokenization

Learn more about Data security at;

https://brainly.com/question/17493537

The mouse, keyboard, and speakers are some of the things that would be plugged into _____ on the back of the system unit

Answers

Answer:

USB PORT are on the back on the system case

How to break and argument at a certain symbol in python.

Answers

Answer:push both of the people away from each other and try to solve things out

Explanation:

importance of tree at least 4 paragraph ​

Answers

Answer:

Why Are Trees Important?

Trees are an integral part of the ecosystem – it helps to maintain balance and also acts as a valuable source of many resources – such as timber, medicine, shelter, raw materials and more. Furthermore, trees are the natural shelter of many animals, hence, this is the reason why animals usually encroach into human territories when forests are destroyed.

Social Value

Historically, trees have been worshipped or given cultural significance. Especially in India, many trees are considered sacred because of their usefulness or their tie to ancient Indian mythologies. Other cultures have symbolically represented trees and their foliage in artworks and sculptures. Moreover, some cultures observe trees as powerful symbols of life, death and rebirth.

Community Value

Trees and other shrubs have adorned our parks and gardens, providing pleasing aesthetics for the environment. Moreover, trees provide shade, which is crucial during the summer months. Trees and other foliage near residential areas increase the value of the area. Furthermore, some trees, which are hundreds of years old serve as popular attractions or as historic landmarks. For example, a tree called the Dodda Alada Mara (Big Banyan Tree) is a popular tourist attraction in Bangalore. This 400-year-old tree covers nearly 12,000 m2 and is considered the largest of its kind.

Ecological Value of Trees

Trees are important to the ecosystem because, without them, the land would become barren and lifeless. Moreover, there are countless animals that live on trees. These animals are called arboreal animals and spend their entire lives on trees – raising their young, feeding, sleeping and mating. If trees are cut down, these animals have nowhere else to live and could go extinct. Animals that live in the trees include sloths, flying snakes, geckos, koalas, opossums and tarsiers. There are hundreds of species of spiders and insects that make trees their homes.

Explanation:

a linear search is performed to find the item emu. state the items which will be examined

Answers

Answer:

A linear search is the simplest method of searching data. set. Starting at the beginning of the data set, each item of data is examined until a match is made.

Reggie is having trouble signing into his email account at work. He picks up the phone to call someone in IT, and then checks the phone list to see who to call. Which IT area should Reggie call

Answers

The IT area that Reggie should call is called; Information Security

What are the functions of an Information Technology Department?

The IT department that Reggie should call is called Information Security department.

This is because Information security protects sensitive information from unauthorized activities such as inspection, modification, recording, and any disruption or destruction.

The aim of this department is to make sure that the safety and privacy of critical data such as customer account details, financial data or intellectual property are safe.

Read more about information technology at; https://brainly.com/question/25920220

What is internet?
What is network?
Difference between them?

Answers

Answer:

Network is defined as the group of two or more computer systems. Whereas internet is the interrelationship of a few networks.

The coverage of network is limited in comparison of internet.

Explanation:

Answer:

What is internet?

The Internet is a vast network that connects computers all over the world. Through the Internet, people can share information and communicate from anywhere with an Internet connection.

What is network?

A network consists of two or more computers that are linked in order to share resources (such as printers and CDs), exchange files, or allow electronic communications. The computers on a network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams.

What is internet?What is internet?What is network?Difference between them?

Network is defined as the group of two or more computer systems. Whereas internet is the interrelationship of a few networks. 2. The coverage of network is limited in comparison of internet.

Explanation:

I hope this helps!

__________ is a Microsoft software development tool that developers can use to write multimedia applications

Answers

answer:

DirectX.    

hopefully this is helpful.

Other Questions
new shopping mall is considering setting up an information desk manned by one employee. Based upon information obtained from similar information desks, it is believed that people will arrive at the desk at a rate of 20 per hour. It takes an average of 2 minutes to answer a question. It is assumed that the arrivals follow a Poisson distribution and answer times are exponentially distributed.a Find the probability that the employee is idle. A program has a infinite while loop. How can you interrupt it? do all species take care of their offspring in the same way? What is the value of z? On February 1, 2020, Teal Corporation issued 3,300 shares of its $5 par value common stock for land worth $37,400. Prepare the February 1, 2020, journal entry. Among them,what kind of Rights are you utilizing now which are provided by World Human Rights Declaration? what kind of benefits do you get from utilization of those rights? What contributed to the ultimate failure of 16th century Spanish expeditions to the north, in what is now the American West Task 3. Mental Illness Chart Directions: What are the causes, signs, and symptoms, and ways to cope with mental illness? Fill in the chart below. Do this in a 1 whole sheet of paper. CAUSES SIGNS AND SYMPTOMS WAYS TO HELP WHEN DANGER SIGNS OCCURS 17. Calculate the mass of hydrogen formed when 24 g of aluminum reacts with excess hydrochloric acidaccording to the balanced equation below.***2A1 + 6HCI - 2 AlCl3 + 3 H2a. 1.5 gb.2.7 gc. 3.4gd. 6.6 g what is the major objective of the first aid The Tao (the way) is a connection withwhat?A. your kidsB. natureC. GodD. the ruler A graph describing the position of the object any time is called. Pendant une interview, une militante de l'organisation Un monde tranquille parle de sa vie avant qu'elle ait reu le prix Nobelde la paix. Employez le plus-que-parfait pour complter ses phrases.Quand j'tais petite, mes parents m' (1)(apprendre) que les gens avalent besoin d'aide et(2)(essayer) de nombreuses fois de me rendre utile. l'universit aussi, j' (3)(combattre) l'injustice et (4)(dfendre) la libert. Mes amiset moi, nous (5)(se promettre) d'aider les opprims. cette poque, j' (6)(penser) devenir avocate. Mais avant de prendre ma dcision, la prsidente de l'organisation(7)(venir) me parler et elle (8)(finir) par me convaincre dedevenir militante obtain the area and perimeter of the shaded region In what year was the Declaration of Independence accepted by the Continental Congress?1760179918031776 How has the injury Gregor acquired in Part Two impacted his daily life? How has it affected his internal world as well? Madison is buying a laptop for $586. He paid for the laptopusing four $100 bills, fifteen $10 bills and forty-six $1 bills. Howmuch did Madison pay? I fear that I shall fall.what is the noun clause You have a 0.200mol piece of aluminum. How many atoms are present inthe aluminum? Under what circumstances may a president be sued