1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
77julia77 [94]
3 years ago
11

In addition to format commands that are found in the ribbon, which option is available for more extensive formatting?

Computers and Technology
1 answer:
eimsori [14]3 years ago
5 0

Answer:

A

Explanation:

You might be interested in
Which one of the following words is NOT an action verb?
pochemuha
Pretty sure the answer is D.Happy

3 0
4 years ago
Read 2 more answers
According to the 2010/2011 Computer Crime and Security Survey, ____ is "the most commonly seen attack, with 67.1 percent of resp
loris [4]

Answer:

Malware infection

Explanation:

Infecting computers with malware through the internet has become the most commonly seen attack according to 2010/2011 Computer Crime and Security Survey.

6 0
3 years ago
Who is willam afton from five nights at freddy
diamong [38]

Answer:

the man behind the murder

8 0
3 years ago
Read 2 more answers
Después de un incidente de seguridad del cliente, el equipo realiza un análisis en profundidad de cada paso dado por los atacant
klio [65]

Explanation:

Respuesta al incidente

5 0
3 years ago
If your cousin wanted to view information from the world wide web, what application software would you tell her to be sure she h
MAVERICK [17]
Well, I would say a web browser, like Mozilla Firefox, Safari for IOS, Windows Edge, Chrome, or Internet Explorer; and some anti-malware software, since there are multiple websites on the WWW that try to steal your information and give your device viruses.
6 0
3 years ago
Other questions:
  • 5. How can a budget prepare you to become financially secure?
    10·2 answers
  • You want to place a video from the internet to your desktop. what process do you use?
    15·1 answer
  • What is the output of the following Python program? try: fin = open('answer.txt') fin.write('Yes') except: print('No') print('Ma
    9·1 answer
  • Cissy looks up a number in the phone book, pushes the book away, and then dials the number. why does she discourage any interrup
    8·2 answers
  • In your memo, give three new employees directions for starting the computer and opening a word-processing document.
    9·1 answer
  • Simon is producing a report on major rivers in North America. In the report he wants to add a table that displays the statistics
    12·1 answer
  • Which option is considered a part of the document that is used to collect specific and predefined information?
    7·1 answer
  • In a school 50% of the students are younger than 10, 1/20 are 10 years old and 1/10 are older than 10 but younger than 12, the r
    7·1 answer
  • How to install specific version of create-react-app so.
    10·1 answer
  • When users connect to the network, they use a basic hardware terminal to access a desktop hosted on a virtualization server. wha
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!