1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nikolay [14]
3 years ago
8

Which of the following is not a method for opening Word software?

Computers and Technology
2 answers:
timofeeve [1]3 years ago
8 0

Answer:

right clicking on the desktop and selecting "view"

Explanation:

Some of the methods for opening Microsoft Word software include;

using the Ms. Word icon on the task-bar

searching for the Ms. Word program if you are using the Widows operating system

using the Ms. Word icon on the desktop

On the other hand, right clicking on the desktop and selecting "view" is a procedure for changing icon settings on desktop,

Sholpan [36]3 years ago
7 0

Answer:

(a) Right clicking on the desktop and selecting “view”

Explanation:

Using an icon on the taskbar =>Similar to the short cut available on the desktop, but the icons in the desktop will be visible only when go to desktop, whereas the icons on the taskbar are available always unless it is hidden.

<u>Searching Programs (option c): </u>The user can use search tool from the start button to find any programs installed on the computer.

Using an icon on the desktop => Means it’s an short cut icon which are created for frequently used program.

Right click and selecting view (option a) won’t work out because it is to change the view of how a desktop look like viz. arranging icons according to the usage, sorting according to the names, etc.

You might be interested in
RAID level ________ refers to disk arrays with striping at the level of blocks, but without any redundancy. A. 0 B. 1 C. 2 D. 3
Mamont248 [21]

Answer:

A. 0

Explanation:

RAID level zero refers to disk arrays with striping at the level of blocks, but without any redundancy.

RAID ZERO (disk striping) : This is the process of dividing a body of data into blocks and also spreading the data blocks across multiple storage devices, such as hard disks or solid-state drives (SSDs), in a redundant array of independent disks (RAID) group.

3 0
3 years ago
Discuss copyright issues as they relate to the Internet, including software piracy and digital rights management, and the Digita
LUCKY_DIMON [66]

To avoid privacy these copyright is been implemented. If copyright is not implemented software company such as Microsoft, Google cannot run the organization so that software has copyright and licenses and they protect from software privacy.

<u>Explanation:</u>

Since the world is digital world all software are available in internet for download and end user will not pay for software and use the software without purchasing from software development industries.

Even software are protected with key, hacker write the tool to brakes the key, so end user easily use these tools and generate the key and user it.

So that software company use Digital millennium copyright act, so that end user can arrested for missing the software’s.

5 0
3 years ago
The _____ _____ form of database attack injects code into user login information with one or more statements that perform action
amid [387]

Answer:

The answer is cross-site scripting(XSS)attack.

Explanation:

Hope this helps!

5 0
2 years ago
A file name extension provides what information about a file?
ASHA 777 [7]
In a file extension, it tells what type of file it is and tells what compiler to run the code.
8 0
3 years ago
Read 2 more answers
How does a cat get out of a bush?
Alex17521 [72]

Answer:

that lil mf crawls through the bush

Explanation:

hes fast ngl

7 0
3 years ago
Other questions:
  • Building relationships during your career exploration is called?
    5·1 answer
  • A musical compact disc is an example of
    13·1 answer
  • Write a for loop to verify that your function is correctly returning the expected output for the radius values between 0 and 11.
    14·1 answer
  • Within the Chart Design tab, which section is used to change the data of a previously created chart?
    12·1 answer
  • Develop a C++ program that will determine whether a department store customer has exceeded the credit limit on a charge account.
    13·1 answer
  • David would like to send a letter to more than one hundred people. He would like the letter to have names and addresses inserted
    12·2 answers
  • Spam and i report
    14·2 answers
  • Discuss TWO changes in ICMP that took place with the development of IPV6 and indicate why those changes were made.
    7·1 answer
  • What does the following process describe?
    10·1 answer
  • Would my phone still work if I snapped it in half?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!