1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
coldgirl [10]
3 years ago
9

Under which menu option of a word processing program does a star appear

Computers and Technology
2 answers:
olga55 [171]3 years ago
6 0

Answer: shapes

Explanation:

alexandr1967 [171]3 years ago
5 0

Answer:

Under the menu option Insert.

Explanation:

Microsoft word allows you to insert different shapes in the document. To find these shapes, you have to open the menu option Insert. Then, you will have to go to Shapes. After that, you have to click there and a box will appear where you will have different shapes that you can use. There you will find the shape of a star that you can include in the document and adjust different features like size and color.

You might be interested in
What does eco driving mean
Elena-2011 [213]

Answer:

Explanation:

Eco driving is the the practice of driving in such a way as to minimize fuel consumption and the emission of carbon dioxide.

8 0
3 years ago
Injection attacks variants can occur whenever one program invokes the services of another program, service, or function and pass
velikii [3]

Answer:

True

Explanation:

In Computer science, It's true that injection attacks variants can occur whenever one program invokes the services of another program, service, or function and passes to it externally sourced, potentially untrusted information without sufficient inspection and validation of it.

5 0
3 years ago
Which is a net ionic equation for the neutralization of a weak acid with a strong base?
Murljashka [212]

Answer:  A net ionic equation for the neutralization of a weak acid with a strong base is:

Explanation:

- Let´s consider this balanced molecular equation:

                                HCN(aq) + NaOH(aq) --------} NaCN(aq) + H2O(l)

- You can see it is an acid-base reaction because OH (-) is taking away the H from HCN.

Where:     NaOH(aq) is the base and  

                 HCN(aq) is a weak acid as it has no oxygen.

- For the total ionic equation we will break up all the possible break ups and we get:

   HCN(aq) + Na (+)(aq)+ OH(-) (aq)  --------- }  Na (+)(aq)+CN(-) (aq) + H2O(l)

- For the net ionic equation we reduce:

     HCN(aq) + OH(-)(aq)  -------- }  CN(-)(aq) + H2O(l)

- We get the weak acid HCN(aq) plus the hidroxide ion which is the base.  

The spectator ions is Na(+)

The net ionic equation for the reaction of any strong acid with any strong base is identical

Net ionic equations for acid-base reactions a neutralization reaction between a weak acid, HCN, and a strong base, KOH.

A weak acid, weak base reaction can be shown by the net ionic equation example:  

HCl(aq) + NaOH(aq) ↔ H2O(l) + NaCl(aq) HF(aq) + OH-(aq) ↔ H2O(l) + F-(aq) HF(aq) + NaOH(aq) ↔ H2O(l) + NaF(aq) H3O+(aq) + OH-(aq) ↔ 2 H2O(l)  

When a strong acid neutralizes a weak base, the resulting solution's pH will be less than 7.

Weak acids as hydrofluoric, HF only dissociate partially or will react with sodium hydroxide, NaOH , a strong base, to produce aqueous sodium fluoride, NaF , and water to get the net ionic equation that describes this neutralization reaction.  

They are not considered to split apart into ions when writing net ionic equations.

This reaction is considered a neutralization reaction. The base (NaOH) and weak acid (CH3COOH) react to produce a salt (NaNO3 and water (H2O).

4 0
3 years ago
What do you believe are the motives of a cyber criminal? Why?
Hatshy [7]

Answer:

Cyber criminal is a attacker or the hacker who tends to hack and steal the personal and confidential information present in the computer systems.The hacking process is carried out by the means of installing the malware in the authorized system,manipulation of the system function,etc.

The cyber crime is executed by the hackers with the help of the knowledge about the operating system and hacking techniques. Attacking the system is done by them so that they can have the confidential information, personal information or data that is not to be share or accessed by anyone except for the authorized user.

The hacked data can be manipulated such as  eliminating data containing evidence, leaked by sharing confidential data with wrong sources etc by the hacker for their own purpose or other reasons.

4 0
4 years ago
What elements make up a web page's content?
zmey [24]

Here are six important design elements you'll want to make sure you get right.

Overall Layout and Visual Appearance. Your site's overall look is, of course, a crucial component of web design. ...

Color Scheme. ...

Typography. ...

Navigation. ...

Content. ...

Don't Forget About Mobile.

Hope I helped! ☺

6 0
3 years ago
Read 2 more answers
Other questions:
  • If you bury a story on digg what have you done?
    7·2 answers
  • Which method is the best way to keep from running late on the day of a test
    10·1 answer
  • The name of a Variable effects its value<br><br> True<br><br> False
    7·1 answer
  • What defines interactive media? The user must play a role in writing the content of the media. The user must do something that d
    6·2 answers
  • Anyone want to talk? it can honestly be about any subject :)
    5·1 answer
  • . Aisha’s supervisor asks her to create an aspect of a program that will hold data and make it easy to access. What does Aisha n
    5·1 answer
  • This is computer and programming
    15·2 answers
  • Which of the following shows the assignment of a string to a variable? Select 3 options.
    11·2 answers
  • Relieved to have survived ,henry rolled off the rink________.giving alex a grateful look
    8·1 answer
  • Question 11 of 20
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!