1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Papessa [141]
3 years ago
7

In what order are ribbons organized? From Microsoft Word

Computers and Technology
1 answer:
Arada [10]3 years ago
3 0

Answer:

Tabs, Groups,Commands.

You might be interested in
Given that ∠XQR = 180° and ∠LQM = 180°, which equation could be used to solve problems involving the relationships between ∠XQM
mr Goodwill [35]

C) 180 − (140 − 7a) = (70 − 3a)

Answer:

C) 180 − (140 − 7a) = (70 − 3a)

Explanation:

i got it wrong by clicking D on usatestprep

4 0
3 years ago
What additive keeps engines clean by preventing contaminates and deposits from collecting on surfaces? a. Friction modifiers b.
White raven [17]

Answer is: Dispersants


Explanation:

Dispersants keep contaminants (e.g. soot) suspended in the oil to prevent them from coagulating. Anti-foam agents inhibit the production of air bubbles and foam in the oil which can cause a loss of lubrication, pitting, and corrosion where entrained air and combustion gases contact metal surfaces.

So that's why the answer is: Dispersants

7 0
4 years ago
Read 2 more answers
VLSI is the process of creating an integrated circuit (IC) by combing thousands of transistors into a single chip. There are two
Tanya [424]

Answer:

ASIC

Explanation:

Undoubtedly, it is the ASIC and not FPGA. The field programmable Gate Array is meant for general purposes, and ASIC is meant for Specific purposes. And here the application-specific condition holds. We need it for medium production of an image transformation, and this is like Bitcoin which is application-specific. And thus, the correct type of IC which we need in this case is the FPGA, And hence, FPGA is the correct option here.

3 0
4 years ago
Which is the fastest method of sharing public folders?
Rasek [7]

Answer:

I'm stuck on this but the correct answers I would at-least pick is A and C I need more information about what operating system you have on the computer.

3 0
4 years ago
Identity theft, where people steal personal information, continues to be a problem for consumers and businesses. Assume that you
svetlana [45]

Answer:

Secure the personal information with complex multi-factor authentication and configure intrusion detection and prevention and a firewall.

Explanation:

Multi-factor authentication is a method of securing a client's personal information from the client's side to the data centre. It uses more than one security processes not policies. There key be three authentications process like a password, security token and biometrics or two authentications like password and biometrics or token.

The firewall and intrusion detection and prevention are vulnerability preventive method to detect and stop cyber attacks.

5 0
3 years ago
Other questions:
  • What do you think about net neutrality??
    6·2 answers
  • What is binary number
    11·1 answer
  • opearating system protection refers to a mechanism for controling access by programs, processes, or users to both system and use
    7·1 answer
  • Toby has lost valuable data on his computer a number of times due to system crashes caused by viruses. He decides to invest in a
    13·1 answer
  • Which graph is the solution to the system 2x – 3 and y < 2x + 4?
    5·2 answers
  • The auxiliary device used to store large volume of data and program for future is called​
    10·1 answer
  • How can you say that a painting is real? ​
    7·2 answers
  • EXPLAIN WHY CRYPTOCURRENCIES ARE NOT RELIABLE.
    5·1 answer
  • How to scan a screenshot on Brainly?
    9·2 answers
  • _____is used to organize and modify the properties of the current selection.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!