1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexandra [31]
2 years ago
7

When did Microsoft released MS-Word 2016? S When did Microsoft released MS - Word 2016​

Computers and Technology
1 answer:
Pepsi [2]2 years ago
3 0

Answer:

July 9, 2015

Explanation:

It was released on macOS on July 9, 2015, and on Microsoft Windows on September 22, 2015, for Office 365 subscribers. Mainstream support ended on October 13, 2020, and extended support for most editions of Office 2016 will end on October 14, 2025, the same day as Windows 10.

You might be interested in
How to see the range of values of vty lines?
PSYCHO15rus [73]

Answer:

To get the range of very lines in a switch or a router, in the global mode, type " line very" and the question mark after the space. It displays the ranges of valid very lines in the device.

Explanation:

Routers and switches are intermediate components of a computer network. They are used to connect various nodes and networks. For a remote connection, they use the virtual interface called vty to connect to computers for management purposes. These vty lines allows for SSH and telnet access from workstations and the range of very lines are predetermined and limited and varies for all switches and routers.

7 0
4 years ago
The ____ security policy is an executive-level document that outlines the organization's approach and attitude towards informati
artcher [175]

Answer: General

Explanation:

General security policy is the high-level formal document that contains the statement and guidelines for maintaining security goals and aspirations of organizational information .

  • It persist concerns regarding requirement , responsibilities and scope that should be present to maintain information security.
  • This document contains outlines to maintain protection of information from theft, attack ,hacking or any other risk.It works on integrity, availability and confidentiality factor.
3 0
3 years ago
Magbigay ng tatlong naidudulot ng teknolohiya sa ating pamumuhay​
Novay_Z [31]

Answer: I would help you

Explanation: IF IT WAS IN ENGLISH

6 0
3 years ago
Write any one method to delete a table in writer​
strojnjashka [21]

Answer:

To delete a table, first select the entire table. Click the “Layout” tab under “Table Tools”. Click “Delete” in the “Rows & Columns” section and select “Delete Table” to delete the table. You can also use the “Delete Columns” and “Delete Rows” options to delete the entire table as long as the entire table is selected

5 0
3 years ago
GIVING BRANLIEST IFFF CORRECT James uses a database to track his school football team. Which feature in a database allows James
lions [1.4K]

Answer:

filter

Explanation:

the filter feature allows him to fetch data that only meets a certain criteria(those who didn't play in the last game)

3 0
3 years ago
Read 2 more answers
Other questions:
  • You are troubleshooting a cpu and have already cut power, disconnected the power cable, opened the case, and put on your antista
    6·1 answer
  • What is the command to use the memory diagnostics tool?
    11·1 answer
  • Write, compile and test (show your test runs!) program that calculates and returns the fourth root of the number 81, which is 3.
    11·1 answer
  • Write a program that checks whether a positive number given by an input from the user is greater than 5 and less than 20 with ja
    12·1 answer
  • Kerry wants to save her file but give it a new name. Kerry should use the ____ command
    7·1 answer
  • What does this mean “Fatal error: Uncaught exception 'Thrift\Exception\TTransportException' with message 'THttpClient: Could not
    7·1 answer
  • Select all that apply.<br> What two things can you do to display the entire contents of a cell?
    12·1 answer
  • Suppose that the five measured SampleRTT values are 106 ms, 120 ms, 140 ms, 90 ms, and 115 ms.
    11·1 answer
  • Select the correct answer. Which keyboard feature is a form feed character? A. uppercase letters B. Control key C. lowercase let
    9·1 answer
  • A start-up employs interns. The following details of interns are stored
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!