1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fittoniya [83]
3 years ago
7

The _____ toolbar can be customized to the preferences of the user.

Computers and Technology
1 answer:
hammer [34]3 years ago
3 0
The answer is quick access toolbar.
 Quick access toolbar can be customized to the preference of the user. It is located at the title bar of the application window but can be configured to display below the ribbon. It consists of a combination up to 20 commands either specified by the application or selected by the user.

You might be interested in
in which situation, a unicast session or a multicast session, can feedback received from an rtcp packet about the session be han
nikklg [1K]

The Real-time Transport Protocol is a network protocol that enables the Voice Over Internet Protocol by delivering streaming audio and video content over the internet (VoIP).

The datagram-oriented protocol is UDP. It is thus because none of the overhead associated with creating, maintaining, and closing connections exists. A network's ability to send audio and video depends on the RTP internet protocol. Designed for reliable live data delivery, the Real-time Transport Protocol (RTP) is a network standard for sending audio or video data. It is utilized in voice over IP, video telephony, and internet telephony. In the OSI model, RTP belongs to both the Presentation Layer (Layer 6) and the Session Layer (Layer 5).

Learn more about protocol here-

brainly.com/question/27581708

#SPJ4

3 0
1 year ago
Specialized programs that allow particular input or output devices to communicate with the rest of the computer system are calle
In-s [12.5K]
Hi!

These programs which allow a peripheral device to interact with the rest of the computer system are going to be <em>device drivers.</em>

Hopefully, this helps! =)
3 0
3 years ago
Cuáles son las redes sociales que más utilizas tú y tu familia. Describe su utilidad.
Ymorist [56]

Answer:

Facebok

Explanation:

we are able to see everthing other people do and are able to limit what are kids do

6 0
3 years ago
Write an expression that continues to bid until the user enters 'n'.
Sergio [31]

I've seen this problem before, you just need the solution to the 'while' loop, right?


Assuming your variable names are the same as the generic question your while loop should look like this:


while (keepGoing != 'n')

7 0
3 years ago
Validating the users claimed identity is called which of the following?A. AuthenticationB. IdentificationC. VerificationD. Valid
soldier1979 [14.2K]

Answer:Authentication

Explanation:

3 0
3 years ago
Other questions:
  • In this story, the reader is strongly encouraged to believe that Skidmore is guilty of poisoning his brother Manchester. Explain
    6·1 answer
  • Which of the following correctly orders the investments from LOWER risk to HIGHER risk?
    7·2 answers
  • .vx*^#♡■●;(<a href="/cdn-cgi/l/email-protection" class="__cf_email__" data-cfemail="eaceaa">[email&#160;protected]</a>(;=!^$□◇○(
    13·1 answer
  • Which Boolean operator produces the result 1 only if both values are 1? Which Boolean operator produces the result 0 only if bot
    13·1 answer
  • What is ambiguous grammar, explain in maximum 50words.
    5·1 answer
  • In Windows 7's Jump List, what can we do?
    6·1 answer
  • In this screenshot, the circled item is the
    15·2 answers
  • Assume that the final grade for a course is determined based on this scale - A: 900 points, B: 800-899 points, C: 700-799 points
    7·1 answer
  • You can use the ____ method to search a string to determine whether it contains a specific sequence of characters.
    14·1 answer
  • 4. Compute the following additions
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!