1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
den301095 [7]
4 years ago
7

In Microsoft Word you can access the blank command for the mini toolbar

Computers and Technology
1 answer:
Romashka-Z-Leto [24]4 years ago
3 0
Please be more specific. What are you trying to ask?
You might be interested in
How to make a negative number positive in excel
Viefleur [7K]

Answer:

DB * -1

Explanation:

Use this formula: DB * -1

DB = Desired Box

DB * -1

4 0
3 years ago
Arpenet was the computer created by the military true or false
Sphinxa [80]

True. It was a project that the pentagon was working on in the 60's

3 0
3 years ago
Physical security controls traditionally include obstacles, alarms, lights, guards, cameras, and responders that produce a(n) __
Lostsunrise [7]

Answer:

secure facility

Explanation:

7 0
3 years ago
A bit pattern is shown below.<br> 01001110<br> Convert the bit pattern into decimal
Vera_Pavlovna [14]

Answer:

78

Explanation:

I always convert to hexadecimal first:

0100 = 4

1110 = E

(the matching of groups of 4 bits to one hex char is a lookup you can memorize)

so we have 4E, which is 4*16+14 = 78

Of course you can also go the long route:

01001110 = 0·2⁷+1·2⁶+0·2⁵+0·2⁴+1·2³+1·2²+1·2¹+0·2⁰ = 78

5 0
3 years ago
Why is Touchpad used in the laptop computer​
Ber [7]

Answer:

in controlling the mouse or cursor

Explanation:

as is it known tha a cursor is a poniting device. and the only way to control it without a mouse is the touchpad

3 0
4 years ago
Other questions:
  • The following parts were ordered by someone building a personal computer:
    12·1 answer
  • Which is NOT a type of SD card?
    8·2 answers
  • you work in the Human Resources department of a company that has partnered with a similar company in Brazil on a big contract. y
    12·1 answer
  • Let's say you want to insert a photo of the Microsoft PowerPoint Ribbon to put into your presentation. Which of these should you
    6·1 answer
  • Information security is defined as practice of preventing unauthorized access, use, disclosure, disruption, modification, or ___
    6·1 answer
  • You've been hired as a consultant to help an online store owner. You need to complete the implementation of conversion tracking
    6·1 answer
  • If you're under 18 and you receive _____ or more license points in 12 months, you'll be restricted to driving only to school or
    11·1 answer
  • use the internet to research the SYSTEM account. Why is it nessesary to include this account with full control on a directory
    13·1 answer
  • People think that they can send email messages from their personal computers and that it cannot be traced. This is called the __
    13·1 answer
  • A protocol stack is _____.
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!