1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elenna [48]
4 years ago
6

The what toolbar can be customized to the preferences of the user

Computers and Technology
1 answer:
schepotkina [342]4 years ago
7 0
Is this a multiple choice question?
You might be interested in
What is the keyboard shortcut used to paste previously copied text?
Sedbober [7]

Answer:

command or control + c

Explanation:

6 0
3 years ago
Read 2 more answers
In procedural programming, where does the flow of control usually route from the main function?
Zinaida [17]

Answer:

Subroutine or called function.

Explanation:

Procedural programming is a programming techniques of creating modular divisions between lines of code, with a provision to call and run a block of code at any given instance in the program.

A program flow control breaks at will from the main function to a target defined function or subroutine, which returns a value back to the normal flow of the program. It uses conditional and loop statement to achieve its task.

6 0
3 years ago
What is meant by saving a sheet document​
Zina [86]

Answer:

While you'll use Save or press Ctrl+S to save an existing workbook in its current location, you need to use Save As to save your workbook for the first time, in a different location, or to create a copy of your workbook in the same or another location.

5 0
3 years ago
Why is my computer getting slower and slower? What can i do without buying a virus scanner?
NeTakaya
It could be that your computer is simply getting older and more worn out, I suggest downloading MalwareBytes, it's a free anti-virus software that I use personally.
7 0
3 years ago
Read 2 more answers
Your bank contacts you to phone a number supplied in the email. What do you do?
never [62]
Login thru a secure portal and verify messages and then report any issues. also another thing you may call your bank to make sure they are the ones who sent the email.
5 0
3 years ago
Other questions:
  • 1. Which of the following are considered CAD powerhouses?
    6·1 answer
  • Being aware of and understanding why potential buyers on a web site do not complete their purchases requires the expertise of __
    11·2 answers
  • Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network. scree
    15·1 answer
  • Fred has to write a report on the general opinion of the influence of television on political decision-making. What internet res
    7·2 answers
  • Write the DML statement to query the database for the following: Output the fname, lname, total_amount_owed of the student with
    5·1 answer
  • For this exercise, you are given a phrase. Return the number of time the word “dog” appears in the phrase.
    7·1 answer
  • A speech why friends are important 2 min​
    11·1 answer
  • what is hardware ? Name the four functional hardware of a computer system Define each of them with the help of a diagram​
    12·1 answer
  • Define a method pyramidVolume with double parameters baseLength, baseWidth, and pyramidHeight, that returns as a double the volu
    8·1 answer
  • Which is the correct process for selecting consecutive rows in a worksheet?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!