1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iris [78.8K]
3 years ago
13

For Power Point: To move the insertion point on a table to a different cell, which key should be pressed?

Computers and Technology
2 answers:
hammer [34]3 years ago
6 0
I could be wrong but I'm pretty sure it's A. Tab
NikAS [45]3 years ago
4 0

Answer:

A. Tab

Explanation:

"Tab" Functions in Power Point:

  • Moves one cell to the right in a worksheet.
  • Moves between unlocked cells in a protected worksheet.
  • Moves to the next option or group of options in a dialog box.
  • Shift + Tab moves to the previous cell in a worksheet or to the previous option in a dialog box.
  • Ctrl + Tab switches to the next tab in the dialog box.
  • Ctrl + Shift + Tab switches to the previous tab in a dialog box.
You might be interested in
1) Why is angle of view important? What are some of the ways that you can do this?
kykrilka [37]

1. Angle of view is the measure of how much of the subject or a scene/view a lens can take in horizontally, vertically or diagonally. So it is important for a photographer to focus on a particular subject or a scene while capturing a photograph.

Using a shorter focal length or moving your camera farther away can help you capture more of a scene in one shot.

2. A photographer might be interested in exploring human beauty or have it as a source of inspiration for his work.

I find portraits of people, focusing on their eyes, very meaningful with a lot of things to be read from it.

3. There must be back light to take a silhouette picture i.e. the background must be lighter than the object.

4. (video is not specified here)

5. (video is not specified here)

3 0
3 years ago
Explain how touch-tone dialing sends digits to the switch and write the name given to define touch-tone dialing.
Sergeu [11.5K]

Answer: Please see below as the answer is self-explanatory

Explanation:

Digital phones, normally uses a keyboard, with the digits 0-9, and special characters like # and *.

When the caller presses any keyboard, an electronic circuit within the phone generates two pure sinusoids, of frequencies within the vocal bandwidth (between 300 Hz and 3 khz, roughly), which identifies uniquely (as decoded by the receiving switch) which was the key pressed.

In this way, the switch reconstructs the phone number called, separating country code, area code and the local number as it receives the tones.

This system is called DTMF (dual tone multi frequency).

4 0
3 years ago
___________ is a technique that uses IT to develop an ongoing relationship with the purchasers or buyers of an organization's pr
Diano4ka-milaya [45]

Answer:

Customer relationship management.

Explanation:

Customer Relationship Management provides the controls overall the relationships of business between the clients and potential customers to getting the profit in the business The main objective of Customer Relationship Management is to enhance the relationships between businesses.  

Customer Relationship Management builds the ongoing partnership with the purchasers or purchasers of the commodity of an organization to optimize the value that the company can offer over time.

5 0
3 years ago
Channel logging tokens can be set to all but:________. a. Relaxed b. Strict c. Both versions d. None
Rudik [331]

Answer:

c. Both versions

Explanation:

The Windows Remote management has hardening levels that could be set to Relaxed, Strict, or None based on the channel binding token associated with a request. This feature could be automatically found in the system or manually configured to a user's choice.

Relaxed settings mean rejection of channel binding token that are not valid and the acceptance of requests with no channel binding tokens, but which may be susceptible to attacks. Strict settings entail an automatic rejection of invalid channel binding tokens. None settings entail the acceptance of all requests with no protection against credential-forwarding attacks.

4 0
3 years ago
What is a type of machine-to-human communication?
suter [353]
I don’t know what it’s called but it’s where they can speak by moving there eyes
3 0
3 years ago
Other questions:
  • Which of them does not support decision making? Options DSS, GDSS, ESS All of above
    10·1 answer
  • The Active Directory Users and Computers tool can be used to:______.
    11·1 answer
  • Which software can managers use to discuss financial performance with the help of slides and charts?
    7·2 answers
  • During a night flight, you observe a steady red light and a flashing red light ahead and at the same altitude. What is the gener
    11·1 answer
  • Which of the selections below is not a benefit of imaging the computers on your network? There are fewer licensing fees because
    11·1 answer
  • If you were required to give a speech identifying the risks of using computers and digital devices, which group of items would y
    7·1 answer
  • How did the internet originate??​
    12·1 answer
  • ______allow you to select elements that are in a certain state, such as when the mouse if hovering over an element
    14·1 answer
  • Keira is creating an app for her cross-country team. Users will input their race times and the output will be a graph showing th
    6·1 answer
  • __________ implements a security policy that specifies who or what may have access to each specific system resource and the type
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!