1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dusya [7]
3 years ago
12

What are the features of the Outline view in Word? Select three options.

Computers and Technology
2 answers:
9966 [12]3 years ago
8 0

Answer:

A,B,C

Explanation:

zvonat [6]3 years ago
7 0

Answer:

making it easier to deal with larger documents

manipulating headings

displaying text with Heading styles

You might be interested in
A system that provides monthly production figures for a manager at manufacturing facility is considered a(n) __________. a. ente
Stolb23 [73]

Answer:

Management information system (MIS)

Explanation:

Most manufacturing companies are organized into levels, with each level having different kinds of information systems. The four major types of systems placed on each organizational level include:

Transactional Processing System (TPS) – Business systems at this level serve at the lowest point of the operational level in an organization. It performs routine transactions like sales entry and payroll.

Management Information Systems – MIS transforms TPS inventory and production data into compressed formats and presented in detailed reports produced as per the agreed schedules to the managers. These reports can be served on a daily, hourly, or monthly basis.

Decision-Support Systems (DSS) – Managers at this level are majorly responsible for making unique and rapidly changing decisions

ESS – It is the strategic level in an organization. Top senior managers use this level to make non-routine decisions that require insight and a lot of judgment.

4 0
4 years ago
Research the topic of legal and ethical behaviors or dilemmas related to technology. Identify five topics of concern and briefly
max2010maxim [7]

Answer:

if you push alt and f4 at the same time it will automatically put the right answer.

Explanation:

7 0
3 years ago
In the well-known ____________________ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and ins
Oduvanchick [21]

Answer:

MAN IN THE MIDDLE

Explanation:

Man in the middle attack is an attack where the attacker secretly relays and possibly alters the communications between two parties. When data is sent between a computer and a server, a cybercriminal can get in between and spy or eavesdrop.

A man in the middle attack can positions himself in a conversation between a user and an application in other to impersonate one of the parties, making it appear as if a normal exchange of information is underway.

In a man-in-the-middle cyber-attack, the attacker places themselves in between two devices and monitor packets from the network, modifies them, and inserts them back into the network without the other parties knowing.

3 0
3 years ago
The flagging of an uncommon last name as a spelling error can be stopped by opening the shortcut menu on the first occurrence of
Mice21 [21]

Solution:

The flagging of an uncommon last name as a spelling error can be stopped by opening the shortcut menu on the first occurrence of the name and selecting of ignoring all.

Thus the required right answer is B.

8 0
3 years ago
Make the list of menu icon in MS Excel<br>​
valina [46]

●file

●home

●insert

●page layout

●formulas

●data

●review

●view

8 0
3 years ago
Other questions:
  • What is the binary answer to the binary number 100 added to the binary number 11?
    14·2 answers
  • It is a function that ends the connection to the database.
    9·2 answers
  • Which option correctly describes a DBMS application? A. software used to manage databases B. software used to organize files and
    7·2 answers
  • Force field meaning in science fiction
    6·1 answer
  • Develop a list of privacy protection features that should be present if a website is serious about protecting privacy. Then, vis
    8·1 answer
  • What is the term used to describe a computer system that can store literary documents, link them according to logical relationsh
    5·1 answer
  • What are some options available in the Spelling and Grammar Checker? Check all that apply. Change and Change All Redo and Repeat
    15·2 answers
  • When you open a program, the hard drive
    7·1 answer
  • List three ways of breaking a copyright law with the illegal copy of software.​
    11·1 answer
  • Providing captions and transcripts for videos on your website is a way of ensuring what?.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!