1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Feliz [49]
3 years ago
6

Mary is writing an article about the software development life cycle. She wants to place a flowchart besides the text. Which men

u should Mary choose for the purpose mentioned below?
Computers and Technology
2 answers:
vichka [17]3 years ago
4 0
The answer to this question is that Mary should choose insert image . Then, in the wrap text Mary should choose “top and bottom” to add it below the text she wrote. Using the option Top and bottom - text appears at the top and bottom of the image.
Anastasy [175]3 years ago
3 0
The menu option which Mary should choose is insert image.She should begin by going on the menu,choose the insert tab within the ribbon and then choose shapes.The shape tool provides a basic selection of shaped objects  that can be inserted  and edited onto the document.Under the shapes she will find various options  like arrows,lines,callouts,flowcharts e.t.c.Then she choose flowcharts.
Then in the wrap text Mary should choose "top and bottom "to add it below the text she wrote.using the top and bottom text appears at the top and bottom of the image.
You might be interested in
A security utility program that scans the system for small programs that interfere with how a computer functions are _____ utili
Aneli [31]

Answer:

A security utility program that scans the system for small programs that interfere with how a computer functions are _____ utilities.

Explanation:

7 0
3 years ago
A coffee shop is considering accepting orders and payments through their phone app and have decided to use public key encryption
Charra [1.4K]

Answer: Yes

Explanation:

Public key encryption is the encryption technique that is used for private keys and public keys for securing the system.Public key is used for encryption and private key is for decryption.Public keys can only open content of the system

  • According to the question, public key encryption is secure for coffee shop customer payment process as they are stored on digital certificates in long form for verifying digital signature and encrypting information.Its computation is difficult to crack through power computer access.  
  • Other options is incorrect as encryption is not a problem for payment procedures. Thus, the correct option is yes ,public key encryption is secure method for coffee shop customers .
8 0
3 years ago
What is it called when you define a variable for the first time
Nimfa-mama [501]

Answer:

That is called declaring a variable

Explanation:

6 0
2 years ago
Read 2 more answers
____________________ are compromised systems that are directed remotely (usually by a transmitted command) by the attacker to pa
Talja [164]

Answer: Zombies

Explanation: Zombie is a computer device that is responsible for the compromising the system and making it prone to several destruction such as the Trojan horse virus,hackers and other viruses as well. Zombie makes the computer system to get malfunctioned easily ,that is without much security and various malicious functions can be performed.They basically act as the infected computer .

6 0
3 years ago
Read 2 more answers
How does ur computer know that its cursor moved
Anton [14]
The sensor of a mouse connected to the computer or the touch pad being touched and swiped around on
8 0
3 years ago
Read 2 more answers
Other questions:
  • Create a division formula.
    9·1 answer
  • A ____ network (or workgroup) consists of multiple windows computers that share information, but no computer on the network serv
    15·1 answer
  • What are the elements of an autobiographical narrative similar to those of a short story?
    7·1 answer
  • What would you recommend for data segregation if using cloud software
    12·2 answers
  • 1. in terms of technology, we often said to be living in the _____ age.???
    15·2 answers
  • Given that arrayIntValues [MAX_ROWS][MAX_COLUMNS] is a 2 dimensional array of positive integers, write a C++ function howManyEve
    11·1 answer
  • Which disc store compacity for full lenght movie? dvd or cd
    14·1 answer
  • What is motivation and state the two forms​
    14·1 answer
  • Information about hardware engineers?
    9·1 answer
  • The Table Design and Layout tabs are available under the
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!