1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alla [95]
3 years ago
5

What kind of command can you access from the mini toolbar in Microsoft Word?

Computers and Technology
1 answer:
qaws [65]3 years ago
5 0
Paint,calculator,camera,snipping tool,file,store,and photis

You might be interested in
State and explain five misused of science and technology​
kap26 [50]

Answer:

Science and technology is the major key of life cycle.

Explanation:

Any five misused of science and technology are:-

•Guns and weapons to clash.

•Phishing sites

•Scamming online or on online shopping.

•Misusing social media and our phones.

•Crazy addictive online games.

6 0
3 years ago
In chapter 3, we discussed syntax and semantics, in general there are two types of grammars for programming languages, regular a
WARRIOR [948]

Answer:

Lexical rules that are defined in case of regular grammar are simple and the notation is quite easy to understand.

Regular expression are useful for defining constructs of identifiers or constants. e.g. a|b etc.

In the case of context-free, grammar is not simple and deals with the productions.

Context-free are useful in describing the nested constructs like if-else etc which are not defined by regular expressions.

These produce a higher level of reliability as it provides a medium for generating syntactical as well as semantic data. The grammar is context-free is a little complex.

Explanation:

8 0
3 years ago
Which of these is true of blackhat and whitehat hackers?
earnstyle [38]

Answer:

Like all hackers, black hat hackers usually have extensive knowledge about breaking into computer networks and bypassing security protocols. They are also responsible for writing malware, which is a method used to gain access to these systems.

Explanation:

that's all. c:

5 0
3 years ago
Read 2 more answers
Complete the sentence.
KatRina [158]

Answer:

tCP

Explanation:

6 0
3 years ago
You're working at a large industrial plant and notice a tag similar to the one shown in the figure above. Which of the following
Fynjy0 [20]
The answer should be B
6 0
3 years ago
Read 2 more answers
Other questions:
  • Exchanging which type of data uses the least bandwidth?
    14·1 answer
  • what is the first step you would take when troubleshooting an external network, such as an internet connection issue?
    13·2 answers
  • Give the algorithm and flowchart for following C code:
    6·1 answer
  • Which tab should gemima use to open the formula dialog box
    13·2 answers
  • A shortage of blood for transfusions for injured animals has resulted in the introduction of a synthesized product called Oxyglo
    15·1 answer
  • What was the first video game ever invented
    11·2 answers
  • What are the main dimensions of information systems
    8·1 answer
  • The ________ is the easy way to insert a new slide between existing slides.
    8·1 answer
  • The data model shows the_______structrue of database.​
    14·1 answer
  • Which finger has two number keys to type instead of just one?.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!