1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Masteriza [31]
3 years ago
11

Please Help ASAP!!

Computers and Technology
2 answers:
ikadub [295]3 years ago
8 0

Answer: Just took the assignment on edge and correct answers are

( layout view, design contextual tab, and the print menu. )

Maurinko [17]3 years ago
7 0

Answer:

in the page layout view

Explanation:

You might be interested in
What type of topology gives you a direct connection between two routers so that there is one communication path?
Setler79 [48]

Answer: Point-to-point topology

Explanation:Point-to-point topology is the connection between the nodes in a simple/regular manner by establishing only one path for the communication with each other.The flow that occurs in this type of topology are of two types - bidirectional(two-way)  and unidirectional(one-way) .

Thus the topology for the communication of the routers through a single communication path is done with the help of point-to-point pattern , considering each router as a point/node.

7 0
3 years ago
What are the cloud storage components
Burka [1]

Answer:

The main physical components of cloud infrastructure are networking equipment, servers and data storage

6 0
2 years ago
Which of the following is caused by wind erosion?
laila [671]
I'm not sure, but I think that  C : topsoil removal <span>is caused by wind erosion. I hope it helps</span>
7 0
3 years ago
Read 2 more answers
A picture of kitchen sink draining system​
ale4655 [162]

Answer: So do you need a picture of that or what do you need exactly i would love to help!!

5 0
3 years ago
Read 2 more answers
Choices.
Svet_ta [14]

Answer:

1. B

2. D

3. C

4. A

5. B

Explanation:

1. To check the integrity of your hard disk and fix various file system errors, the Windows utility which should be implemented is Check disk (Chkdsk). This utility is always used with the command line interface (CLI) with the command "chkdsk."

2. An event or action took place and it caused damage to data, hardware, software and processing capability of the computer. From the statement given, security risks are being described. Any event or action that is capable of causing a problem to a computer system is considered to be a security risk and should be prevented through the use of an appropriate utility software.

3. Virus is a software program that can infect, damage and disrupts the whole computer system.

4. To protect the whole computer system, the software utility which is needed is an Anti-virus.

5. To avoid losing valuable data to your computer, the most important thing to do is to regularly back-up your files.

7 0
3 years ago
Other questions:
  • What is a quick way to close the header or footer view in a microsoft word document?
    12·1 answer
  • Unit 3 Computer Programming Study Guide
    6·1 answer
  • How many 16ths are in 3/8 of an inch
    12·1 answer
  • Traditional methods of business communication tend to mean paper-based messages such as formal letters, brochures, reports, prop
    10·1 answer
  • What is an online recommendation engine?
    12·1 answer
  • Which computer component are you most like? Explain why.
    10·1 answer
  • During a test, it is generally best to: A. answer all questions in order B answer the essay questions first C. answer the least
    7·2 answers
  • Evie clicks through her presentation slides and realizes they all have transition effects coming from the same location, from th
    13·1 answer
  • What are some things all boomers say.
    12·2 answers
  • Which of the following is not part of the processes involved in data valida
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!