1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Viefleur [7K]
3 years ago
8

Match the following.

Computers and Technology
2 answers:
Brums [2.3K]3 years ago
7 0

Answer:

#4 is quick access tool bar #7 is zoom bar #2ribbon #5 scroll bars #6 title bar #1contextual bars #3 ruler

;)

Explanation:

bija089 [108]3 years ago
6 0

Answer:

#4 is quick access tool bar #7 is zoom bar #2ribbon #5 scroll bars #6 title bar #1contextual bars #3 ruler

You might be interested in
You are designing a VPC for a small application. It will operate in a private subnet and needs internet access to software updat
lilavasa [31]

Answer:

Refer below.

Explanation:

VPC, Subnets, Route Table(s), Nat Gateway, and Internet Gateway. These are the least required services to provide internet access to a private EC2 instance. NAT gateway requires an internet gateway.

3 0
3 years ago
Your organization has started receiving phishing emails. You suspect that an attacker is attempting to find an employee workstat
EastWind [94]

Answer:

E). User education and training.

Explanation:

In the context of network security, the most significant aspect of ensuring security from workstation cyberattacks would be 'education, as well as, training of the users.' <u>If the employee users are educated well regarding the probable threats and attacks along with the necessary safety measures to be adopted and trained adequately to use the system appropriately so that the sensitive information cannot be leaked</u> while working on the workstation and no networks could be compromised. Thus, <u>option E</u> is the correct answer.

3 0
3 years ago
What are sums of money that are given out for specific reasons?
xenn [34]

Answer:

a

Explanation:

6 0
3 years ago
Read 2 more answers
What type of software can you use to capture and examine the contents of network messages?
Ludmilka [50]
They're usually referred to as packet sniffers.
7 0
3 years ago
Which formula is used to measure accuracy?
Westkost [7]

Answer:You can only find REaccuracy if you know the actual “true” measurement… something that's difficult to do unless you're measuring against the atomic clock. The formula is: REaccuracy = (Absolute error / “True” value) * 100%.

Explanation:

7 0
3 years ago
Other questions:
  • What folder holds 32-bit programs installed in a 64-bit installation of windows?
    12·1 answer
  • What ip class is this address: 128-191.255.255.255?
    5·1 answer
  • Please help! (I cant figure out)
    13·1 answer
  • A lottery ticket contains five unique numbers. A set of unique numbers does not contain repeated elements. The winning combinati
    10·1 answer
  • The M:N relationship between STUDENT and CLASS must be divided into two 1:M relationships through the use of the ENROLL entity;
    10·2 answers
  • Who began digitizing books on a massive scale and putting them online?
    8·1 answer
  • Please, ignore
    6·2 answers
  • What specific job usually includes the important pre-production step of making the
    12·1 answer
  • 45 points!!
    15·2 answers
  • John wants to know the amount of ram memory installed on his computer. in which category of the windows 7 control panel can this
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!