1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kipish [7]
3 years ago
15

Clifford created a table using OpenOffice Writer and entered some information into the table. Later, he needed to add more rows

into the table. Where can Clifford specify the location of the new rows for the existing table?
Computers and Technology
2 answers:
Sever21 [200]3 years ago
7 0

The answer is A. The Size section of the Insert Table dialog box

#Platogang

Minchanka [31]3 years ago
4 0

Right click the cell, click add cells & it should say the options (new row above etc.)

You might be interested in
The house had a wonderful pool of ... (his/its/our) own.​
-BARSIC- [3]

Answer:

its

Explanation:

"It" used in a number of different forms of sentences and has several rules. 'It' can be used in a sentence either for a Subject or an Object. It can be used as an introductory word in a sentence when there is no mention of the subject. It used for the singular, third-person pronoun. While it has many uses and according to the question, it is used to refer to a lifeless object (home).

6 0
3 years ago
Which of the following best explains why some people invest their saving in the stock market and others put their saving in bank
Tanya [424]
The answer to this question is B. Some people feel that the stock market is too risky for them.
7 0
4 years ago
Read 2 more answers
__________, a level beyond vulnerability testing, is a set of security tests and evaluations that simulate attacks by a maliciou
True [87]

According to security evaluation, <u>Penetration testing</u> is a level beyond vulnerability testing, a set of security tests and evaluations that simulate attacks by a malicious external source (hacker).

Penetration testing is often considered or described as ethical hacking. It involves the process of securing a firm or organization's cyber defenses.

The process of penetration testing or security testing includes assessing for exploitable vulnerabilities in networks, web apps, and user security.

Hence, in this case, it is concluded that the correct answer is <u>Penetration testing.</u>

Learn more about <u>penetration testing</u> here: brainly.com/question/13137421

6 0
3 years ago
4. The Internet may best be compared to a/an A. series of colored lights. B. loud truck motor. C. enormous skyscraper. D. large
Triss [41]
D. Large network of roads.

A resembles a modem/router and C a webserver.
6 0
3 years ago
During slideshow mode hitting the b key will do which of these
Lemur [1.5K]
<span>If it's an multiple answer question it's....


</span><span>B.) Blank the screen with black screen (or return to the slide if you are currently blank).</span>
8 0
3 years ago
Other questions:
  • Once the technology for the collection of solar power is in place what will be two benefits of its use
    9·1 answer
  • What are the pros and cons of editorial anonymity?
    13·1 answer
  • Using a wireless network without the network owner's permission is known as ________.
    15·1 answer
  • When network cards are communicating, bits can occasionally be corrupted in transmission?
    5·1 answer
  • How can we style the images and layouts of our pages?
    8·1 answer
  • Please HELP me it a test and it due rn. Please no links
    9·1 answer
  • Write a program that repeatedly takes integers from the user as long as he
    7·1 answer
  • Where did the name "QWERTY" come from?​
    9·1 answer
  • It would be at least two decades before some of
    12·1 answer
  • When dividing it’s total debt by total equity what’s a company trying to measure
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!