1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nikolay [14]
3 years ago
8

Which of the following is not a method for opening Word software?

Computers and Technology
2 answers:
timofeeve [1]3 years ago
8 0

Answer:

right clicking on the desktop and selecting "view"

Explanation:

Some of the methods for opening Microsoft Word software include;

using the Ms. Word icon on the task-bar

searching for the Ms. Word program if you are using the Widows operating system

using the Ms. Word icon on the desktop

On the other hand, right clicking on the desktop and selecting "view" is a procedure for changing icon settings on desktop,

Sholpan [36]3 years ago
7 0

Answer:

(a) Right clicking on the desktop and selecting “view”

Explanation:

Using an icon on the taskbar =>Similar to the short cut available on the desktop, but the icons in the desktop will be visible only when go to desktop, whereas the icons on the taskbar are available always unless it is hidden.

<u>Searching Programs (option c): </u>The user can use search tool from the start button to find any programs installed on the computer.

Using an icon on the desktop => Means it’s an short cut icon which are created for frequently used program.

Right click and selecting view (option a) won’t work out because it is to change the view of how a desktop look like viz. arranging icons according to the usage, sorting according to the names, etc.

You might be interested in
Which code snippet is the correct way to rewrite this in Semantic HTML?
xxMikexx [17]

Answer:

<div id="header">

<h1>Waketech</h1>

</div>

<header><h1>Waketech</h1></header>

Explanation:

I think thats the answer your welcome

8 0
11 months ago
Users in a corporation currently authenticate with a username and password. A security administrator wishes to implement two-fac
Katen [24]

Answer:

Option (C) is the correct answer of this question.

Explanation:

Smart card is the security administrator wishes to implement two-factor authentication to improve security.Normally this data is affiliated with either meaning, information, or both, and will be stored and transmitted within the chip of the card.A smart card, usually a Chip Card type.

  • It is a flexible card that holds an integral computer chip that preserves and sends a signal data, either database or semiconductor form.
  • Used for controlling access to a resource.
  • Data authentication, encryption, cloud storage, and software processing can be established by smart cards.

Other options are incorrect.

4 0
3 years ago
Which one of the following pieces of information would be allowed as part of a limited data set?
Inessa05 [86]
Phone number would be allowed
6 0
3 years ago
Three types of neurons and their function
kramer

<u>Efferent Neurons:</u> efferent neurons are motor neurons that carry neural impulses away from the central nervous systme and towards muscles to cause movement.

<u>Interneurons: </u> a neuron which transmits impulses between other neurons, especially as part of a reflex arc

<u>Astrocytes:</u> Astrocytes are the most numerous cell type within the central nervous system (CNS) and perform a variety of tasks, from axon guidance and synaptic support, to the control of the blood brain barrier and blood flow. To perform these roles, there is a great variety of astrocytes.

Explanation:

7 0
3 years ago
PLEASE help me i dont get this at all
zepelin [54]

Answer:

dont know dont really care

Explanation:

6 0
2 years ago
Read 2 more answers
Other questions:
  • Which word processing file that contains text and other
    13·2 answers
  • Write the definition of a function named averager that receives a double parameter and returns-- as a double -- the average valu
    11·1 answer
  • ______ are used to store all the data in a database.
    7·1 answer
  • 9. What command do you enter in the Explorer search box to access the Remote Admin share on the computer named Fin?
    7·1 answer
  • If a folder exists on an NTFS partition, which permission is needed by a user who needs to set security permissions on the folde
    11·1 answer
  • Gus has decided to organize his inbox on June 26 by using folders and deleting irrelevant messages. He creates a folder called "
    12·2 answers
  • In honor of Black History Month, write an essay about a black person who has inspired YOU in some way. This person does not have
    8·1 answer
  • Upload your completed project including the following:
    13·1 answer
  • Which option identifies the programming paradigm selected in thr following scenario? A student is writing a science fiction stor
    12·1 answer
  • scheduling is approximated by predicting the next CPU burst with an exponential average of the measured lengths of previous CPU
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!