1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sergio039 [100]
4 years ago
15

Explain the function of the Ribbon in Microsoft Word.

Computers and Technology
1 answer:
Yakvenalex [24]4 years ago
5 0
Simple. the ribbon in Microsoft Word contains a lot of your key functions that you can do without having to go into any menus. however you can edit this ribbon to your liking to increase productivity
You might be interested in
What device is designed specifically to reduce broadcast traffic that passes over a network and to choose the best path for movi
mezya [45]

Answer:

Router        

Explanation:

  • A router is a network device that forwards data packets between networks. Its a network layer hardware device. For example a DSL router that connects to the Internet through an internet service provider.
  • Router is connects at least 2 networks (can be two LANs) and the ISP.
  • Router is used to transfer data from one network to another if both networks use same protocols.
  • It receives data in packets form and forwards the data to another router using a routing table. These data packets can be sent between devices or from devices to the internet.
  • The routing table is used to choose the optimal path for forwarding the packets between the source and destination hosts. Routing table configure the best route a packet can take to reach its destination using routing protocols. A Routing Protocol defines how routers connect with each other and share information that makes them choose routes on a computer network between source and destination. Routing tables can be configured statically (routes are fed manually) or dynamically (routes are updated based on information obtained  from other routers).
  • Router makes sure that the data packets reach right destination instead of being lost within the network and it also strengthen signals before transmitting them.
  • Routers reduce broadcast traffic. They form boundaries between broadcast domains and separate a network into multiple broadcast domains.
  • Router do not broadcast traffic and eliminates the packet when it detects a broadcast address. Routers also stop broadcast messages and don't route a broadcast message between broadcast domains.
6 0
3 years ago
Luminaires for fixed lighting installed in Class II, Division 2 locations shall be protected from physical damage by a suitable
ser-zykov [4K]

Given what we know, the protection for fixed lightings like the ones described in the question is by way of a guard or by location.

<h3>Why is protection necessary?</h3>

Luminaires, as with all lighting solutions, can be dangerous if proper safety precautions are not taken. The precautions, in this case, include a safe installation location or the use of a guard to prevent damage to the lighting and subsequently to any nearby occupants of the location.

Therefore, we can confirm that Luminaires for fixed lighting installed in Class II, Division 2 locations shall be protected from physical damage by a suitable guard or by a safe location.

To learn more about Electrical safety visit:

brainly.com/question/14144270?referrer=searchResults

4 0
3 years ago
Assume you have 100 values that are all different, and use equal width discretization with 10 bins.
zepelin [54]

Answer:

a) 10

b) 1

C) 10

D) 1

E) 20

F)  10

Explanation:

a) The largest number of records that could appear in one bin

 = 10

B) The smallest number of records that could appear in one bin

= 1

C) The largest number of records that cab appear in one bin

= 10

d) smallest number

= 1

e) With frequency = 20. the largest number of records that could appear in one bin with equal width discretization (10 bins)

= 20

f ) with equal height discretization

= 10

6 0
3 years ago
Which of the following is one of the first steps in implementing a comprehensive security program? Setting up a Guest account Cr
yKpoI14uk [10]

Answer:

Setting a strong password policy

Explanation:

In implementing a comprehensive security program, one of the first steps would be to set up a strong password policy.

It is important to understand what the company is trying to protect from third parties.

Setting up a password policy is going to increase the security of the system through the use of strong passwords.

5 0
3 years ago
To place the caption at the top of the image you will need to change the ________
makkiz [27]

wrong!! it was postion!!

4 0
4 years ago
Other questions:
  • A company is inviting design for its new corporate logo from its users. This is an example of ? A. Crowdfunding B. Crowdvoting C
    7·2 answers
  • I'll pay 50 dollars to anyone who can do this leave your snap after answering doing it and ill cash app it
    13·1 answer
  • Assume the existence of an UNSORTED ARRAY of n characters. You are to trace the CS111Sort algorithm (as described here) to reord
    14·1 answer
  • What did Aristotle teach?
    6·2 answers
  • 30 points
    7·1 answer
  • Estan clasificadas como piezas alargadas y dentada<br>​
    10·1 answer
  • Can someone plz explain me what this button does and I’m scared to click it
    11·1 answer
  • 2. You are developing a new application that optimizes the processing of a warehouse’s operations. When the products arrive, the
    10·1 answer
  • Complete each of the following sentences by
    10·2 answers
  • What should the Dhruv consider when connecting to the Internet in a public place? Select all that apply.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!