1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Helga [31]
3 years ago
11

Ron is creating building blocks in Word. How can he make the building blocks that he created available?

Computers and Technology
2 answers:
daser333 [38]3 years ago
7 0

A) Store those building in Normal template

Sergio039 [100]3 years ago
6 0

Answer:

The correct answer is  A) Store those buildings in the Normal template.

Explanation:

Word usually stores the building blocks in a file template. So, with the purpose of modifying or making the building blocks available, it is strictly necessary to save the document as a normal template.

You might be interested in
Insert the missing code in the following code fragment. This fragment is intended to read an input file named dataIn.txt and wri
olasank [31]

Answer:

new Scanner(inputFile)

Explanation:

In Java when inputting a file using Scanner class. A Scanner breaks the input into tokens with the help of delimiting patterns, by default which matches the whitespaces and then the tokens that are received may be converted into values of different types by suing different next methods.

6 0
3 years ago
How to fix my pc from this
Ray Of Light [21]

Answer:

Restart it

Explanation:

6 0
3 years ago
Read 2 more answers
How to create PowerPoint presentation computer networking using visual diagrams
DanielleElmas [232]

https://www.google.com/url?sa=t&source=web&rct=j&url=https://support.office.com/en-us/article/video-create-a-network-diagram-a2360cd9-5c9d-4839-b4f6-17b485e02262&ved=2ahUKEwjlr4bdjd7hAhUiyYUKHR1UC1EQwqsBMAB6BAgLEAU&usg=AOvVaw3ZFpgzww1z4gFaeRCROkF-

7 0
3 years ago
China sends a computer virus that shuts down telephone service in the United States. In retaliation, the United States hacks int
Brrunno [24]

In the case above, it exemplifies how the United States can be both victim and perpetrator of cyberattacks.

<h3>What are cyberattacks?</h3>

A cyber attack is known to be a form of an online assault that is said to be launched by a lot of cybercriminals through the use of one or more computers against a single or a lot of computers or networks.

Note that In the case above, it exemplifies how the United States can be both victim and perpetrator of cyberattacks as it is an online assault.

See options below

a. establishes military superiority

b. can be both victim and perpetrator of cyberattacks

c. places a low priority on cyberattack protection

d. has nothing to fear from cyberattacks

Learn more about computer virus from

brainly.com/question/26128220

#SPJ1

6 0
2 years ago
Which is needed for the specific task of inserting a chart into a report?
Arturiano [62]

To add charts in Access to reports, click the “Create” tab in the Ribbon. Then click the “Report Design” button in the “Reports” button group. Unlike other report controls, the chart control uses its own data source to show its data. Therefore, you can insert it into a blank, unassociated report, if desired

6 0
3 years ago
Other questions:
  • Which one of the following is NOT a type of reference method that uses a terminal digit system? 1) Account payables 2) Medical r
    11·1 answer
  • Write a function called calculate() that accepts three integer Numbers as arguments, compute these values : Sum and Product and
    7·1 answer
  • Define the term e-learning​
    5·2 answers
  • What is a mortgage?
    8·2 answers
  • What is the definition of delimited text?
    14·2 answers
  • Cabe participates in her employer’s PPO plan. Denzel participates in her employer’s HDHP plan. Neither have any medical expenses
    11·2 answers
  • What is thhe name of service included with windows server operating systemthat manages a centralized database containing user ac
    5·1 answer
  • Suppose there are two hosts, S and R. They are communicating over a TCP connection, and R has already received from S al bytes f
    11·1 answer
  • The company’s computer network is down. Who should you contact to correct this problem? Information Technology Associate Master
    12·1 answer
  • Which of the following is not part of the processes involved in data valida
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!