1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
storchak [24]
4 years ago
10

David has created a lot of styles and now his Quick Style Gallery contains styles he no longer uses.

Computers and Technology
1 answer:
shusha [124]4 years ago
3 0

Answer:

Right-click the style in the Quick Styles Gallery, and select the Remove from Quick Style Gallery option.

Explanation:

You might be interested in
Workstation control standards institute security requirements to harden end user devices. For example, a Malicious Code Protecti
Evgen [1.6K]

Answer:

B. False

Explanation:

This is false because for a policy to prevent an infection, there are different processes that takes place. Such processes include detecting the type of infection that enters into the system and then trying to fight it off through the programmed tools.

Detection and reporting of symptoms also helps in the identification of the infection before it is fought.

5 0
3 years ago
State three reasons why users attach speakers to their computer​
____ [38]

Answer:

For listening sake

To listen to information from the computer

They receive audio input from the computer's sound card and produce audio output in the form of sound waves.

8 0
3 years ago
Which of the following correctly pairs a financing option with its description?
snow_lady [41]
<span>grants & schollarships- money you earn</span>
8 0
3 years ago
Read 2 more answers
The Department of Homeland Security only deals with threats to national security and does not play a role in helping companies m
adoni [48]

Answer:

False

Explanation:

The Department of Homeland Security (DHS) plays vital role to secure country from many types of threats. One of the Operational and Support Components of DHS is Cybersecurity and Infrastructure Security Agency (CISA).

CISA plays the leading role to protect IT infrastructure from cybersecurity threats of today. It works with partners from all levels of government and private sectors to meet the challenges of cybersecurity.

3 0
3 years ago
A ____________ is a set of commands which can be run by calling it by name. (Phyton)
Lerok [7]

Answer: script

Explanation:

I haven't done much Computer Science in whichever subject this is, but I'm sure a script is a series of commands!

7 0
3 years ago
Read 2 more answers
Other questions:
  • File formats are linked to certain programs.<br><br> True<br> False
    12·2 answers
  • Ooooooooooooooooooooooooooooh im blinded by the lightssssssssss
    11·1 answer
  • How to highlight text on a kindle paperwhite?
    7·1 answer
  • Francis works in the human resources division of a large oil and gas company in Texas. Francis' tasks include maintaining payrol
    14·1 answer
  • The drone intercepts at 1256 hour. what time do they plane to take control of the drone
    11·1 answer
  • You are using a tool on your computer to organize a variety of files in folders. what is the term for this kind of tool?
    14·2 answers
  • Pablo can view a minimum of_____ panes and a maximum of_____ panes in a split screen worksheet.
    7·1 answer
  • Suppose you can access the caches in the local DNS servers of your department. Can you propose a way to roughly determine the We
    14·1 answer
  • What is the first step in finding a solution to a problem
    13·1 answer
  • Please help me!! (two questions)
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!