1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anzhelika [568]
3 years ago
15

Another name for the Office Button menu is the toolbar. Please select the best answer from the choices provided T F

Computers and Technology
2 answers:
lara31 [8.8K]3 years ago
7 0

Answer:

The answer is actually true, I just took the test.

Explanation:

Troyanec [42]3 years ago
6 0

False is the answer for this question i just did a test on E2020 and it was false because it gave me the answer the other person is wrong just to let you know


You might be interested in
1. Consider a direct-mapped cache that can accommodate 8Mbytes from a main memory, that uses a 32-bit address and 32-byte blocks
Tom [10]

Answer:

See explaination

Explanation:

Cache can be referred to as a hardware or software component that stores data so that future requests for that data can be served faster; these stored data in a cache might be the result of an earlier computation or a copy of data stored elsewhere.

Please kindly check attachment for step by step solution.

8 0
3 years ago
1. What are the biggest password mistakes that people and companies make? How can you avoid those mistakes?
Ghella [55]

Answer:

1. Keeping a password with user name or password is very easy word.

2. Passwords should be kept strong so that it cannot be haccked. One should use upper case letters along with lower case letters and numeric and special characters to make the password strong.

3. The businesses usually run anti viruses in case of virus attack. In case of haccker attack businesses are temporarily shut down from their routine work and alternate business plan is activated which runs the business activities incognito version.

4. High profile passwords can be leaked as it is on the computer system which can be accessed from around the world.  

Explanation:

The businesses should use DRP system in order to avoid complete shut down of business operations in case of a cyber attack. The passwords should be kept strong enough so that no one can crack the password and all employees should not be given complete access to business operations and planning activities. Employees access should be restricted to their job role.

5 0
3 years ago
Who are the best candidates for members of SkillsUSA? Check all that apply. Adolph wants to be an Elementary School Teacher. Rub
SpyIntel [72]

Answer:

On edge its 3,4,5,6

Explanation:

3 0
4 years ago
Read 2 more answers
Different types of names given to explicit convertion in java<br>​
melamori03 [73]

Answer:

Different types of name given to explicit conversation in java are

1. Automatic

2. Explicit

3 0
3 years ago
What is the danger in judging someone according to his or her social networking profile
AfilCa [17]
They could find you and throw hands.
8 0
3 years ago
Other questions:
  • Given the following characteristics for a magnetic disk pack with 10 platters yielding 18 recordable surfaces (not using the top
    14·1 answer
  • In a certain computation, 90% of the work is vectorizable. Of the remaining 10%, half is parallelizable for an MIMD machine. Wha
    9·1 answer
  • Below is the prototype for a function that takes two pointers to integer variables as its parameters. The purpose of the functio
    14·1 answer
  • Complete the function doubling_time that takes two parameters bal and apr and uses a while loop compute the number of years it t
    10·1 answer
  • Nina is 12 years old. She has just changed her password and wants to make sure she has it in case of
    15·2 answers
  • Documenting Business Requirements helps developers control the scope of the system and prevents users from claiming that the new
    13·1 answer
  • The _________ lets you move the view of a web page up or down and left or right.
    13·2 answers
  • Submit your business presentation that clearly compares and contrasts three different cell phone service plans. I have TO HAVE I
    14·1 answer
  • Explain why this scenario could put an organization in jeopardy of losing some of its workforce.
    12·1 answer
  • You recently created a new network segment for the development department. Because the hosts are now on a different network segm
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!