1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Naddika [18.5K]
3 years ago
8

Which Tab contains the font style attributes? Home Insert Review View

Computers and Technology
2 answers:
umka2103 [35]3 years ago
8 0

The home tab contains the font style attributes

olga_2 [115]3 years ago
7 0

The answer is A) the home tab

You might be interested in
Select the correct answer.
Vilka [71]

Answer:

B version number

Explanation:

5 0
3 years ago
how can people access to a range of online services affect their ability to operate safely in the digital world
Andru [333]
Have parental controls on certain sites
3 0
3 years ago
When looking at security standard and compliance, which three (3) are characteristics of best practices, baselines and framework
Brilliant_brown [7]

Answer:

In order to observe best practices, and to meet with technical and other requirements, organizations often use frameworks for cybersecurity compliance and regulatory compliance. These frameworks provide best practices and guidelines to assist in improving security, optimizing business processes, meeting regulatory requirements, and performing other tasks necessary to achieve specific business objectives such as breaking into a particular market niche or selling to government agencies.

Many such frameworks exist, and the recommendations set out in them can impose difficult and often expensive demands on enterprise resources – especially in situations where an organization is subject to a number of regulatory compliance regimes, whose requirements it has to meet while maintaining its own strong cybersecurity status.

Explanation:

4 0
3 years ago
Unused neural connections in the brain are reduced through a process of
OLEGan [10]

Answer:

Pruning or remodeling

Explanation:

The brain is the major control system of animals. It acts just like the processor in a computer system. Brain development starts before childbirth and progresses to adulthood.

During the first few year of life, the neural and synapse connection multiply by millions, when the brain is mature enough, the brain begins to cut off connections of synapses, neurons and axons that are not used through the process called pruning or remodeling, which is very vital for brain development.

6 0
3 years ago
If you are using a sprite for your MakeCode Arcade game, which code block
xeze [42]

Answer:

set mySprite block

Explanation:

BRAINLIEST?

8 0
2 years ago
Read 2 more answers
Other questions:
  • There are 55 registers, and total 60 instructions available in a general-purpose computer. The computer allows only 2-address in
    14·1 answer
  • What is computer engineering?
    11·1 answer
  • Which signal types are represented by a continuous wave form?
    11·1 answer
  • Given the following characteristics for a magnetic disk pack with 10 platters yielding 18 recordable surfaces (not using the top
    14·1 answer
  • In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server
    6·1 answer
  • Give two examples of situations or appliance where electrical circuits are used​
    9·1 answer
  • Speed and security are advantages generally associated with<br> networks.
    9·1 answer
  • What are the dominant InfoSec-related credentials used to document knowledge and/or experience?
    15·1 answer
  • ___________ is some danger that can exploit a vulnerability.
    15·1 answer
  • According to the test for x-ray film freshness, the film is fresh and has been properly stored and handled when the processed fi
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!