1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andriy [413]
3 years ago
13

To use the Save As command, click on the __________tab to open the backstage view.

Computers and Technology
1 answer:
yarga [219]3 years ago
6 0
To use the Save As command, click on the __________tab to open the backstage view.
File tab
You might be interested in
Why does brainly have 3-2 sites? I'm asking since I get tired from making 3-2 accounts on each one. Well by checking each accoun
Lyrx [107]
Each site could be for a different region for Brainly mainly because I just checked and one of the other Brainly sites had a lot more different people having questions in different languages.  
6 0
3 years ago
I want to start a debate about something
vovangra [49]

Answer:

I agree for 13-yrs old not having driving licenses because they will become a lot of wrecks and they also can kill themselves or someone and I also agree that they should not be able to get jobs because if someone stills something or a robbery happens then they could get kidnapped or they could get shot

3 0
3 years ago
Read 2 more answers
How can you encrypt and decrypt a message in cryptography
ser-zykov [4K]
There are two main types of encryption - <span>symmetric and asymmetric. 

Using symmetric encryption, you use a single secret key that is used to both encrypt and decrypt the data. This form of encryption has been used way before computers! Without this key it is very hard to decrypt a message. However, the issue with this is that if you want to send an encrypted message, you also have to send a key to them, and </span>if your somebody unintended intercepts the key, they can read the message.

What's the solution? Asymmetric cryptography or public key encryption. Asymmetric cryptography uses encryption that splits the key into two smaller keys. One of the keys is public and one is kept private. A good metaphor for understanding this is the public key is the lock, and the private key is the key. You can encrypt a message to send to somebody with their public key, locking it, which they can then decrypt, unlock, with their private key. And vice versa. So with this kind of encryption it's very difficult to decrypt a message for anybody but the owner as it's much harder to steal when it doesn't need to leave their computer, but easy to encrypt messages to send to them

5 0
3 years ago
Please hurry Arrange the steps of the engineering design process in the correct sequence.
AnnZ [28]

Answer:The Nine steps  of the engineering design process

  1. <u>Identify the Problem</u>-Defining the problem
  2. Finding solutions through Brainstorming technique
  3. Conducting a background research/Survey
  4. Developing the solution-Creating an array of solutions
  5. Selecting the best solution
  6. Building a prototype
  7. Testing and redesigning
  8. Improve the design-Specifying the requirement
  9. Communicating the result

6 0
3 years ago
One tool under What-If-Analysis is Scenarios. Which best describes the purpose of setting up and using scenarios
nika2105 [10]

Answer:

Option B, to instantly compare results when data in numerous cells change to specified values

Explanation:

Scenario setting with in the What If Analysis is used to compare various scenarios with in the same excel sheet. Scenarios has set of values that are saves and updated automatically as the values with in the cell changes. Also the scenarios can be switched.

Hence, option B is correct

7 0
3 years ago
Other questions:
  • How do you calculate the total voltage in a series circuit with more than one component?
    13·2 answers
  • Say our confusion matrix is as follows, calculate precision, recall, and accuracy. Interpret the results for the positive class.
    10·1 answer
  • What is the name of the computer through which e-mail messages are sent and received?
    12·1 answer
  • Main characteristic of open source software<br> ?
    7·1 answer
  • Which software fits into the category of a productivity software?
    11·1 answer
  • What do you do to add a line or circle to your presentation?
    7·2 answers
  • 5.11 Of these two types of programs:a. I/O-boundb. CPU-boundwhich is more likely to have voluntary context switches, and which i
    9·1 answer
  • Which types of files can be used to define Kubernetes manifest files? yaml, json, yaml and text files
    5·1 answer
  • A ____ is an electronic device, operating under the control of instructions stored in its own memory, that can accept data, proc
    11·1 answer
  • The ability to present an effective message with useful content is obviously important to a good _____ presentation.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!