1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kipiarov [429]
3 years ago
3

The Tell Me feature also includes access to the _____ feature

Computers and Technology
1 answer:
mezya [45]3 years ago
5 0

Tell me is a text field where you can enter words and phrases about what you want to do next, and quickly get to features you want to use or actions you want to perform.

When you're editing a file in Office for Mac you can access Tell me by clicking the light bulb to the right of the tabs, and entering your query, as seen in the image below.

You might be interested in
Which of the following is the shortcut key combination for pasting copied text?
lys-0071 [83]
Ctrl + v pastes copied text, ctrl + p brings up a print menu, ctrl + x cuts and copies highlighted text, while ctrl + c copies the highlighted text.
3 0
3 years ago
Read 2 more answers
What function(s) does an interpreter perform with the instructions in a high-level programming language?
allochka39001 [22]

Answer:

Translates and Executes.

Explanation:

5 0
3 years ago
[c++] Write a recursive function takes a word string as input argument and reverse the word. Print out the results of recursive
Aleks04 [339]
I will try to give you the best answer I can possibly come up with. 
The easy way to get it is to store it into an array of strings and print the array of string backwards. You can do that by starting at the last part of the array down to the first letter.
3 0
3 years ago
Does anybody want to be my friend
Gekata [30.6K]

Answer:

Yeah sure, mines aatelophxbia, i'm 14. what games you play?

6 0
4 years ago
Read 2 more answers
What do “phone-copying” systems allow investigators to do?
Anastasy [175]

Answer:

it allows them to be able to look at the recent things people done on it . i believe

6 0
3 years ago
Other questions:
  • A virtual private network (VPN) is used to securely connect to another network over a insecure network.
    9·2 answers
  • Which method deletes a footer from a document?
    13·2 answers
  • Research information technology affects on job market, career pathways, occupational outlooks in business and finance and synthe
    7·1 answer
  • 2. What is the layout of the modern keyboard known as?
    13·1 answer
  • Which statement describes borders and shading ?
    13·1 answer
  • What does Data storage enable a browser to do
    5·1 answer
  • 2. An evil twin attack that broadcasts a legitimate SSID for an unauthorized network is an example of what category of threat? A
    9·1 answer
  • I need help getting earbuds please help
    11·2 answers
  • Match each of the following terms to its definition: I. web-based II. open source III. project management IV. personal informati
    12·1 answer
  • HELP ME PLZZZ I'll give brainist​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!