1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
guajiro [1.7K]
4 years ago
14

When working with tables, if I wanted odd and even rows to be formatted differently, I would select the ___ option from the Tabl

e Tools Design tab.
1. Header Row
2.Banded Columns
3.Banded Rows
4.Table Styles
Computers and Technology
1 answer:
coldgirl [10]4 years ago
8 0
I would say that It is the Banded rows option.
You might be interested in
You receive an instruction from the CIO to create the logical structure of the company from the active directory domains. In ord
SOVA2 [1]

Answer:

A.This can be accomplished using Organizational units (OUs).

Explanation:

This is the statement that best describes how you should accomplish this task. An organizational unit (OU) is a subdivision within an Active Directory. Therefore, this is what will allow you to create the logical structure of the company from the Active Directory domains. When using an OU, you can place users, groups, computers and other organizational units within it. Moreover, each domain is able to create its own organizational unit hierarchy.

4 0
3 years ago
What could prevent earmuffs from providing your ears good protection from noise?
uranmaximum [27]
Well for one thing, ear muffs were made to keep your ears warm, not protection from noise.
3 0
4 years ago
What penetration testing tool combines known scanning and exploit techniques to explore potentially new attack routes
lisabon 2012 [21]

Answer:

metasploit.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Metasploit is a penetration testing tool that combines known scanning and exploit techniques to explore potentially new attack routes. It's officially and formally licensed to Rapid7, a company based in Boston, Massachusetts.

Basically, metasploit is a framework that's mainly focused on availing end users such as ethical hackers, with information about security vulnerabilities in a system, development of intrusion detection system (IDS) signature and modular penetration testing.

8 0
3 years ago
What is the purpose of using iteration or looping statements in a javascript code
Sonja [21]

In computer science, a loop is a programming structure that repeats a sequence of instructions until a specific condition is met. Programmers use loops to cycle through values, add sums of numbers, repeat functions, and many other things
Loops allow programs to perform repetitive tasks, such as iterating through an array, while adhering to the DRY principle (Don't Repeat Yourself). They come in handy when you want to execute a function a number of times, using different sets of inputs each time.
5 0
3 years ago
How has the use of computers impacted business
Svetlanka [38]
It has allowed for better organization, faster communication, and more advanced actions that people can't complete
3 0
4 years ago
Read 2 more answers
Other questions:
  • Which technology is the basis for XML?
    14·1 answer
  • The date function to apply when you want to display only the current date in the worksheet is the _____ function.
    6·2 answers
  • What imbalance is fixed by a single right rotation?
    11·1 answer
  • In a non-formatted/standard template, if the number 25 is converted to text format, the
    14·1 answer
  • Which option helps you adjust column width to match the text?
    13·1 answer
  • Do most good businesses have to deal with conflict
    7·1 answer
  • When the Hyper-V role is added to a Windows Server 2016 server, the hypervisor creates the individual environments, each of whic
    5·1 answer
  • I need help with this ​
    6·1 answer
  • Based on the information in the table, which of the following tasks is likely to take the longest amount of time when scaled up
    14·1 answer
  • Need answer ASAP
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!