1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mylen [45]
3 years ago
7

What is a office buttom?

Computers and Technology
1 answer:
SpyIntel [72]3 years ago
3 0
The Microsoft button was exclusively used in the 2007 versions of word, excel, powerpoint, access and outlook. It has all of the different options like to save, print, open ect. It was located in the top left hand corner of the screen. It looked a bit like this (see attachment).

You might be interested in
Need help coding this it uses input and I need to use the words good and morning
Masja [62]

Answer:

x = input ("Enter a word: ")

y = input ("Enter a word: ")

print ( x, " ", y)

Explanation:

This is the simplest way to write it using Python.

6 0
3 years ago
Emma is trying to decide whether to buy a new laptop. As a student, she has a budget and wants to make sure this is the right fi
Fudgin [204]

Answer:

What will I have to sacrifice if I buy this laptop

Explanation:

Emma by asking herself this question will scale her preference as well as compare her opportunity cost in determining if purchasing the laptop is importance to her at the moment and of what other thing will she be willing to sacrifice just so she could buy herself a laptop, and how the purchase would still be within her projected budget.

7 0
3 years ago
The ____________ protocol enables two users to establish a secret key using a public-key scheme based on discrete logarithms
strojnjashka [21]

The answer in the space provided is the Diffie-Hellman Key Exchange. This is entitled to be the first published key algorithm in which has a limit in which the exchange occurs in secret values and that its purpose was to enable two users to have an exchange of key in a secure manner in means of using it for a subsequent symmetric encryption in terms of messages.

7 0
3 years ago
On an ATM network, how is the path that data will take determined?
Bingel [31]

Answer:

The path that data will take is determined by the switches.

Explanation:-

On ATM(Asynchronous Transfer Mode) Network switches determine the optimal path between the sender and the receiver then establish the path between them before the transmission of data.These  switches with the help of algorithm finds the best route for the data transmission.

3 0
4 years ago
What types of data can you filter using the
Butoxors [25]

Answer: A and B

Explanation: just did it on edge

4 0
3 years ago
Other questions:
  • When widgets, or portable chunks of code, are embedded on html pages and thereby help increase the functionality of those pages,
    9·1 answer
  • What is the term for the process of gathering information through images taken at a distance?
    13·1 answer
  • As part of his proofreading process, and to catch any spelling or grammar mistakes, John uses this feature in Word Online to hav
    7·1 answer
  • How can i become an ailen?
    5·2 answers
  • The number of square units required to cover a surface.
    13·1 answer
  • Given below is information about a network. Choose one of the following three​ options: the network is definitely a​ tree; the n
    9·1 answer
  • What is a good safety precaution to take when opening a computer case?
    9·1 answer
  • Write a program to enter RADIUS of a CIRCLE and PRINT AREA of TRIANGLE using Q Basic. (class 8)​
    9·1 answer
  • Create a variable in php to store your university information and parse using jQuery Ajax and print your name. The variable must
    12·1 answer
  • In the second example with modulus math, why can't Eve find the solution?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!