1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fittoniya [83]
3 years ago
7

The _____ toolbar can be customized to the preferences of the user.

Computers and Technology
1 answer:
hammer [34]3 years ago
3 0
The answer is quick access toolbar.
 Quick access toolbar can be customized to the preference of the user. It is located at the title bar of the application window but can be configured to display below the ribbon. It consists of a combination up to 20 commands either specified by the application or selected by the user.

You might be interested in
A server is a special kind of computer that manages access to resources such as files, applications, peripherals, emails, and we
Basile [38]

Answer:

true

Explanation:

6 0
2 years ago
Read 2 more answers
____ are model building techniques where computers examine many potential solutions to a problem, iteratively modifying various
gregori [183]

Answer:

E. Genetic algorithms

Explanation:

In Computer science, Genetic algorithms are model building techniques where computers examine many potential solutions to a problem, iteratively modifying various mathematical models, and comparing the mutated models to search for a best alternative.

6 0
3 years ago
Question #1
arlik [135]

Answer:

Pseudocode and flowchart.

Explanation:

I just got it correct.

8 0
3 years ago
In DNS cache poisoning, valid packets exploit poorly configured DNS servers to inject false information to corrupt the servers'
myrzilka [38]

Answer: True

Explanation: Domain name system(DNS) is the kind of attack that exploits the functioning of the DNS .This process is also known as the DNS spoofing .The corrupted data is invoked in the cache database and thus creates spoof.

It creates diversion of the traffic from the actual servers to the fake servers and entering the exploited data in the cache database.Thus, the given statement is true.

4 0
3 years ago
What is the relationship between optical drives and WORMs?
Effectus [21]

Answer:

When data is written to a WORM drive, physical marks are made on the media surface by a low-powered laser and since these marks are permanent, they cannot be erased. Rewritable, or erasable, optical disk drives followed, providing the same high capacities as those provided by WORM or CD-ROM devices.

Explanation:

Good luck

6 0
3 years ago
Other questions:
  • A customer states that when she removes the printed pages from her laser printer output tray, the black ink smears all over her
    10·1 answer
  • Which tab and group will allow the insertion of rows and columns in a worksheet?
    8·2 answers
  • Steps for turning off two step verification on ,for example, iPhones.
    7·1 answer
  • Are u a chicken nugget!!??
    14·2 answers
  • Write a Java program to print the result in the series 10, 15, 20, 25, ..., 50. Hint: You can use an iteration statement for wri
    9·1 answer
  • How many times go you need to click the format painter button to apply copied formats to multiple paragraphs one right after the
    5·2 answers
  • Rachel wants to post content from digital cameras on the web. Which online tool will help Rachel to post and edit content on a w
    5·1 answer
  • If you have a long title and need it to span several cells, you can use what?
    12·1 answer
  • What is the main feature of Ethernet over Power?
    9·1 answer
  • Is this statement true or false? You can apply only one of these at a time: underline, bold, or italics. true false
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!