1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Misha Larkins [42]
3 years ago
8

Under which menu option of a word processing program does a star appear

Computers and Technology
1 answer:
scoray [572]3 years ago
6 0

Star is one of the shapes. This is available under the Shape menu. To get this feature, click on Insert tab. If you click insert tab, you will get a shape menu, and then click on the arrow under shape icon which displays lots of shapes available in the word.

It contains recently used shapes in the top. If you don’t find star under the recently used shapes, you can find that below the recently used shape. Shapes contains other shapes like basic and advanced shapes.

You might be interested in
Write down eight points on how modern technology have effected our life ?
luda_lava [24]

Answer:

  1. Made everyday activities easy to do
  2. We have become dependant on mordern technology
  3. We use the internet for everything
  4. Meetings can be done online
  5. food can be ordered and delivered online
  6. Payments can be done using technology
  7. We pay more attention to social media
  8. Meet new people online
3 0
3 years ago
A string that contains only 0s,1s, and 2s is called a ternary string. How many strings of 10 ternary digits (0, 1, or 2) are the
alexdok [17]

Answer:

Number of strings = (10, 2)×(8,3) = 2520

Explanation:

The number of possible combinations for taking two 0's is C(10, 2)

It remains 8 Positions

The number of possible combinations for taking three 1's is C(8,3)

So there remains 5 spots

8 0
4 years ago
Read 2 more answers
Select the correct term to complete the sentence.
Marat540 [252]

Answer:

A program that searches a database for specific words and returns a list of webpages or documents in which the search term was found. ... A _____ is an application that runs in a

Explanation:

6 0
2 years ago
Read 2 more answers
Describe a situation in which you have experienced harm as a consequence of a failure of computer security. Was the failure mali
Andrei [34K]

Answer: The goals of computer security are to protect computers and users from data theft or loss as well as damage to any part of the computer.

Explanation: Common means of achieving computer security are firewalls, anti-virus software and this can fail due to hardware problems  or   weaknesses that prevent malicious attacks.

To answer this question, think of a time when you experienced any one of these. For example, personally, I was once an unfortunate victim of a general malicious attack that took advantage of a weakness in my anti-virus software. After clicking on a link on a dodgy website, a virus was installed on my computer. My computer finally crashed, without any hope of restarting it. I lost all my data and I had to buy a new computer.  This was a malicious attack.

However, sometimes people can be specifically targeted to steal their data or monitor their activities.  

8 0
3 years ago
Active Directory and __________ are critical in centralizing control of authentication and security policies in a domain environ
vagabundo [1.1K]

Answer:

DNS(Domain Name Services) is the correct answer.

Explanation:

DNS is the type of directory system which is distributed that finds the solution of a hostname which is readable by the human being. It is also critical in centralizing control of the confirmation and policies of the security in the environment of the domain with Active Directory. That's why the following answer is correct.

4 0
3 years ago
Other questions:
  • Write a program that tells what coins to give out for any amount of change from 1
    6·1 answer
  • If the base-10 system stops with the<br> number 9, then why isn't it called<br> base-9?
    15·1 answer
  • ITS MAKING ME TYPE URL CODES NOW!
    6·1 answer
  • Toby has lost valuable data on his computer a number of times due to system crashes caused by viruses. He decides to invest in a
    13·1 answer
  • Which of these trade-offs occur in a memory hierarchy?
    15·1 answer
  • At the beginning of Section 5.2, it is stated that multiprogramming and multiprocessing present the same problems, with respect
    8·1 answer
  • What is the most common knowledge computer programmers need in order
    15·2 answers
  • 5. An external CSS file is saved with D. Answer the following questions. 1. Explain the purpose and advantages of using CSS.​
    7·1 answer
  • Taran wants to work in the technology field but is unsure of which career to pursue. He has been told he has strong people skill
    14·1 answer
  • assuming the default gateway is connected to the internet, what type of internet access would this server have?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!