1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Jet001 [13]
3 years ago
11

_______ allows you to specify how a photo is positioned in the text of your document.

Computers and Technology
1 answer:
Lisa [10]3 years ago
5 0
<span>The answer your looking for is Wrap text!!</span>
You might be interested in
If a large organization wants software that will benefit the entire organization—what's known as enterprise application software
Ganezh [65]

The organization must develop it specifically for the business in order to get the functionality required is True.

a) true

<u>Explanation:</u>

In software development industry it called as EAS. Where organizations required complete one solution and made most customizable with less cost effective.

Moreover to implement the same organizations has to spend less money for software development and hardware appliances. An organization has clear documented which specific their business requirements and their business future expansion.

Basically in organization from low grade employee to higher employee and meeting is arranged and understand system requirements and compiled as document which is circulated to higher official in organization for their final approval.

5 0
3 years ago
You can view the existing Access Control Lists for a set of folders on a Windows system by right-clicking the folder you want to
NikAS [45]

Answer:

And clicking the security tab option.

Explanation:

Lets explain what an object's ACL is. I will use an example to best explain this. Let's suppose that user Bob would want to access a folder in a Windows environment. What supposedly will happen is that Windows will need to determine whether Bob has rights to access the folder or not. In order to do this, an ACE with the security identity of John will be created. These ACEs are the ones that grant John access to the folder and the ACLs of this particular folder that John is trying to access is a list of permissions of everyone who is allowed to access this folder. What this folder will do is the to compare the security identity of John with the folders ACL and determine whether John has Full control of the folder or not.

By right clicking the folder and selecting the security tab, John will be in a position to see a list of the permissions (ACLs) granted to him by the folder.

3 0
3 years ago
Mario was surprised that the box that was supposed to tell him how many words he used in his document did not appear after the s
Nookie1986 [14]

Answer:

Click the Display tab

Explanation:

Choose the Word count option to make it visible, within the Display tab dropdown

7 0
3 years ago
Read 2 more answers
Which of the following is the largest measurement for the weight of a bag of dog food?
jasenka [17]

Answer:

approximately 5 lbs but no sure weight.

6 0
3 years ago
Read 2 more answers
Computer programs can be opened from where?
lions [1.4K]

Answer:

Desktop

Explanation:

Start button on windows:  Start allows you to access your computer programs and configure Microsoft Windows easily by accessing the Start menu.

Finder on macs:  the Finder is your gateway to all of the files, apps, and downloads on your Mac.

6 0
3 years ago
Read 2 more answers
Other questions:
  • On January 1, 1980, Moises deposited $1850 into a savings account paying 5.6% interest, compounded quarterly. If he hasn't made
    9·2 answers
  • When looking through the documentation for a specific class, you never actually see the source code for that class. Instead, you
    6·1 answer
  • What happens to formulas with relative cell references when they are copied using the fill handle?
    12·1 answer
  • #include
    9·1 answer
  • How do you add a PDF assignment to google docs and be able to edit it?
    13·1 answer
  • You just bought a hard drive, you plan on using this a secondary storage, once installed, what needs to be done to the drive and
    6·1 answer
  • To achieve asymptotically optimal performance, a skip list must use promotion probability . true or false and
    14·1 answer
  • The lines that connect the points of a polygon are called: (1 point)
    6·2 answers
  • The function below takes two arguments: a string (name) and an integer (position). Complete the function so that it prints out t
    7·1 answer
  • Which type of service offers a preconfigured testing environment for application developers to create new software applications
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!