1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nikolay [14]
3 years ago
8

Which of the following is not a method for opening Word software?

Computers and Technology
2 answers:
timofeeve [1]3 years ago
8 0

Answer:

right clicking on the desktop and selecting "view"

Explanation:

Some of the methods for opening Microsoft Word software include;

using the Ms. Word icon on the task-bar

searching for the Ms. Word program if you are using the Widows operating system

using the Ms. Word icon on the desktop

On the other hand, right clicking on the desktop and selecting "view" is a procedure for changing icon settings on desktop,

Sholpan [36]3 years ago
7 0

Answer:

(a) Right clicking on the desktop and selecting “view”

Explanation:

Using an icon on the taskbar =>Similar to the short cut available on the desktop, but the icons in the desktop will be visible only when go to desktop, whereas the icons on the taskbar are available always unless it is hidden.

<u>Searching Programs (option c): </u>The user can use search tool from the start button to find any programs installed on the computer.

Using an icon on the desktop => Means it’s an short cut icon which are created for frequently used program.

Right click and selecting view (option a) won’t work out because it is to change the view of how a desktop look like viz. arranging icons according to the usage, sorting according to the names, etc.

You might be interested in
Fill in the correct term to complete the statement. _____ refers to borrowing money from a bank.
Vera_Pavlovna [14]

taking a guess here : a lone.

hope this helps.

4 0
3 years ago
Read 2 more answers
Triangle O N M is cut by line segment L K. Line segment L K goes from side N O to side N M. The length of N L is x, the length o
Fantom [35]

Answer:

D) x=8

Explanation:

4 0
3 years ago
Read 2 more answers
Why is a memory hierarchy of different memory types used instead of only one kind of memory?
Kipish [7]

Answer: Memory hierarchy is the hierarchy that is created on the basis of the response time of different memories. The performance obtained by the memory helps in creating a computer storage space in distinguished form. The factors considered for the creating of the hierarchy structure are usually response time, storage capacity, complexity etc.

Usage of different kind of memories take place due to different kind of requirements from the system which cannot be fulfilled using one memory device.The requirement is based on saving time, decreasing complexity , improving performance etc.Example of requirements can be like some functions and files do not require much space , some might require quick accessing,etc.

Thus hierarchy of any particular system is in the form of fast to slow order from registers,cache memory, Random access memory(RAM) and secondary memory.

5 0
3 years ago
Who do u play as in sister location
seropon [69]
Well, it really depends on who you believe, because i have a lot of friends who say it is Purple Guy, but i have others that say you just play as an unknown character. So, i would go with Purple Guy, but I'm only like 85 percent sure.
5 0
3 years ago
Read 2 more answers
Which of the following solutions should an administrator use to reduce the risk from an unknown vulnerability in a third-party s
ser-zykov [4K]

Answer:

A. Sandboxing

Explanation:

The best solution to apply for this task would be Sandboxing. This is a software management strategy that isolates applications from critical system resources and other programs. In doing so you effectively add a secondary security layer on top of the application in order to prevent any and all malware from entering and damaging your overall system. Thus effectively reducing the risk.

4 0
3 years ago
Other questions:
  • The Left Shift key is used to capitalize which keys?
    5·2 answers
  • Using the Invert Selection tool while something is selected in Paint will __________.
    14·1 answer
  • How do you reduce computer screen flicker
    11·1 answer
  • A port is the point at which a peripheral device attaches to or communicates with a computer or mobile device. True False
    15·1 answer
  • Why is Linux widespread in academic environments?
    7·1 answer
  • Which is said to be ‘computer on a chip’ (a) Micro processors (b) Microcontrollers (c) Both (c) None of the above
    9·1 answer
  • Lasses give programmers the ability to define their own types. <br><br> a. True<br> b. False
    10·1 answer
  • What do you mean by HDML coding ​
    13·1 answer
  • Look at the code in the example below, and then answer the question.
    9·1 answer
  • with a ____ the traffic of a given enterprise or group passes transparently through an internet in a way that effectively segreg
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!