1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Cerrena [4.2K]
3 years ago
13

Which actions can be performed on tables in Word? Check all that apply.

Computers and Technology
2 answers:
Bess [88]3 years ago
6 0
All of these functions/action are able to be performed on Microsoft word, most just don't know how to.
tigry1 [53]3 years ago
3 0
✓ adding rows
✓ adding columns
✓ deleting rows
✓ deleting columns
✓ changing column width
✓ aligning tables
✓ converting tables to text
✓ converting tables to graphs

Believe it or not, all of these actions are possible in MS Word.
You might be interested in
Assuming outFile is a file stream object and number is a variable, which statement writes the contents of number to the file ass
professor190 [17]

Answer:

Its outfile<<number.

However, before this we need to write

outfile.open("xyz.txt", ios;;out)

outfile<<number

And this code will do what is required in the question. This is going to write the number's content to the xyz.txt file which is the file associated with the outfile.

And remember this is in C++. And C++ is a imperative oriented programming language. Undoubtedly, Python and R are fully object oriented programming languages.

Explanation:

The answer is self explanatory.

7 0
3 years ago
A student is helping a friend with a home computer that can no longer access the Internet. Upon investigation, the student disco
Alexxandr [17]

Answer:

Due to unreachable DHCP server

Explanation:

As we know that Dynamic Host Configuration Protocol, in short  DHCP is the network protocol which is used to central and automatic management of IP address with in the network.

So due to unreachable DHCP server a student could not able to connect with the internet.When the network connection break it means that DHCP server is offline.

So the answer is Due to unreachable DHCP server .

8 0
3 years ago
Stacy is in the process of creating a storyboard for her personal website, but she is unable to decide which storyboarding techn
Shalnov [3]

Answer:

Webbed storyboard technique

Explanation:

There are several storyboard techniques; however, the best for a website is the webbed storyboard technique.

Coined from the word "web", this technique does not only help in linking pages within the website where a page can be access from other pages, it also links pages of the website to external pages.

An illustration is as follows:

From the homepage of a website, one can access the contact page, the about page, etc.

Each of the listed pages also have link back to the homepage and to every other pages.

5 0
2 years ago
if a person walks 10 metres due to south in 10 seconds 10 due east in the next 10 seconds and transmitted you're not in the next
Scorpion4ik [409]

Answer:

\frac{1}{3}\ m/s

Explanation:

The computation of the velocity by using the following formula is

As we know that

Velocity = \frac{Displacement}{Total\ time\ taken}

where,

Displacement is 10 meters

Total time taken is 30 seconds

Now placing these values to the above formula

So, the velocity of Dash is

= \frac{10\ meters}{30\ seconds}

= \frac{1}{3}\ m/s

We simply applied the above formula so that we can get the velocity and the same is to be considered

5 0
3 years ago
Rock, Paper, Scissors is a two-player game in which each player chooses one of three items. If both players choose the same item
mezya [45]

Answer:

The answer is c

Explanation:

7 0
3 years ago
Other questions:
  • A ____ by a design professional is used to determine the best system to provide the appropriate level and type of protection.
    6·1 answer
  • How can you create the first row of the table as the header of the table?
    14·2 answers
  • Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer syste
    7·1 answer
  • The mobile nodes (devices) add or leave a Mobile Ad-hoc Network, changing the _____ of this network over time. a) infrastructure
    14·1 answer
  • Which precaution should be taken when working inside computer systems??
    9·1 answer
  • Your network has four Hyper-V hosts, which are running three domain controllers and about 10 member servers. Three of the member
    10·1 answer
  • How do you change the order of the slides in your presentation in the slide pane 
    15·2 answers
  • Cómo se llaman los robots que se utilizan para la exploración espacial, en medicina, en la industria, en la agricultura, los que
    13·1 answer
  • Please help with question
    14·1 answer
  • In C language. Print numbers 0, 1, 2, ..., userNum as shown, with each number indented by that number of spaces. For each printe
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!