1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LenKa [72]
4 years ago
5

When you select Insert and click on a shape the mouse pointer turns into a/an

Computers and Technology
2 answers:
o-na [289]4 years ago
6 0
The answer to this is C I-beam 
S_A_V [24]4 years ago
6 0

Depending on the situation, the shape of the pointer may be an arrow, an I-beam, a hand, or an hourglass (Figure 5)

⇒The arrow pointer is displayed when the pointer is on a command or other selectable item. Click the pointer on the command to select it. Hover, don’t click, over any Ribbon command or icon to display a pop-up description.

⇒The I-beam pointer is displayed within a document. Move the I-beam with the mouse and then click to move the insertion point to that location.

⇒The hand pointer appears when pointing to a hyperlink, like that found in a help window displayed by the Tell Me box. When you click a link a browser window opens.

⇒The hourglass pointer is displayed to indicate that Word is working on an action.

The answer is C. I-beam

You might be interested in
What is the term for the error caused when one end of an unshielded twisted-pair (UTP) cable is terminated in the T568A configur
FinnZ [79.3K]

Answer:

A transposition is the correct answer.

Explanation:

A transposition is the type of encryption that caused when one side of the unshielded twisted pair cable is finished in the configuration of  T568A and at the other side of the configuration of T568B, it is also termed as error or cipher. So, that's why the following answer is true.

7 0
3 years ago
Derek has an interest in designing video games. What requirements should he fulfill to be a game designer?
dolphi86 [110]
Compooter science :D
3 0
3 years ago
F1: 2^14 formula ....................................................................
QveST [7]

Answer:

=POWER(2,14)

Explanation:

The complete question is to write the given formula in cell F1

We have:

F1 = 2^\wedge {14}

The above formula implies 2 raised to the power of 14.

In Excel, this can be achieved using the power function

And the syntax is:

=POWER(m,n)

which means m^n

So, 2^14 will be entered in cell F1 as:

=POWER(2,14)

4 0
3 years ago
What type of system security malware allows for access to a computer, program, or service without authorization?
olasank [31]

Answer:

"backdoor" is the correct answer for the above question

Explanation:

  • The backdoor is a type of attack which is done by the type of backdoor programs to remotely access the computers without the authorization of the user of the computer.
  • It is inserted on the computer with the help of the internet and accessed the computer without using authorization techniques.
  • The above question asked about the virus which is used to access the computer without the permission of the right use of the system. Hence the answer is backdoor which is defined above.
7 0
4 years ago
Suppose a reference variable of type Double called myDouble has already been declared. There is also a double variable x that ha
eimsori [14]

Answer:

Double newMyDouble = new Double(x);

myDouble = newMyDouble2;

Explanation:

Here the new object newMyDouble is firstly the initial value of said 'double x'. In the second line myDouble is the reassigned the the newMyDouble, which is in fact, the value of x. This exercise helps you understand the syntax of using reference variables in JAVA and their assignment along with reassignment.

5 0
3 years ago
Other questions:
  • Look at the following array definition:
    11·1 answer
  • All of the following statements correctly describe an advantage or disadvantage associated with the use of Monte Carlo Analysis
    9·1 answer
  • In python:
    8·1 answer
  • What is an IP address and where I can find the IP address for my computer?
    14·1 answer
  • _____emphasizes on proper breathing and the mind-body-spirit connections.​
    6·2 answers
  • What are three attributes of the input tag
    5·1 answer
  • Why is information broken down into packets
    15·1 answer
  • How do I make someone "Brainiest". <br> First person to reply will get "Brainiest"
    8·2 answers
  • Type the correct answer in the box.
    15·1 answer
  • What number is represented as a binary code of 101110
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!