1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
horrorfan [7]
3 years ago
13

What options does the Table Tools Layout contextual tab contain? Select three options.

Computers and Technology
2 answers:
alex41 [277]3 years ago
4 0

Answer:

This tab contains two tabs, Design and Layout that give you the ability to quickly format your table, insert or delete rows and columns, set the alignment for cells, and format the typography of the text in your table

Explanation:

Tresset [83]3 years ago
3 0

Answer:

A. modify text direction

C. insert rows and columns

E. split table

You might be interested in
A disgruntled employee can harm a company by launching a computer virus, changing or deleting files, or exposing system password
Setler [38]

Answer:

Threat disgruntled employees

Explanation:

This is a type's threat in a network, why disgruntled employees is a threat?

Because disgruntled employees can implement a plant to damage a company's system when an IT employee be fired.

I t can be difficult to try to protect a system of these threats, Traditionally companies can wait for the less damage, then delete those credentials.

In cloud computing we have IDaaS, where an external company administers the company's credentials, is harder to damage the system in this way.

5 0
4 years ago
When is the redo log buffer written to the redo log file?
natka813 [3]

Answer: B)The redo log buffer becomes one-third full.

Explanation:Redo log buffer is the type of buffer file that is present for storing the changes that have been done in data. Database changes are the made goes in the records of the redo entries.the change of the buffer to the redo files is done when the buffer contains change records which are full till the one-third section, thus conversion takes place from the redo buffer to the redo files.

5 0
3 years ago
Which option for creating a table involves the use of a grid of squares?
SSSSS [86.1K]
It’s draw table iirc
4 0
3 years ago
Read 2 more answers
Assume there are 15 students registered for a history class. You will need to declare an array of the StudentType structure to c
andrezito [222]

Answer:

#include <iostream>

using namespace std;

struct StudentType{

   string studentName;

   int studentId;

}

int n;

char answer[20];

int main(){

   cout<< "Enter the size of the array: ";

   cin >> n;

   StudentType *student = new StudentType(n);

   for (int i = 0; i < n; i++){

       int name;

       int number;

       cin>> name;

       cin >> number;

       student[i].studentName = name;

       student[i].studentId = number;

   }

   for (int i = 0; i < 20; i++){

       cout<< "Enter answers: ";

       cin >> ans;

       answer[i] = ans;

   }

}

Explanation:

The C++ source code has three global variables namely, answer which is an array of character data type, StudentType which is a structure data type and the integer variable n. The main function declares and initializes the dynamic-spaced student array of the structure datatype with the n variable.

3 0
3 years ago
If several programs or apps are running simultaneously, your computer or device might use up its
kirill [66]

Answer: I am pretty sure it's RAM

Explanation:

I'm not 100% positive bc I haven't gotten my scores back yet but I think that's it.

7 0
3 years ago
Other questions:
  • How do you change the slide layout?
    6·2 answers
  • Special numeric has three digits and holds a property that it is exactly equal to summation of cubes from each digit. For exampl
    11·1 answer
  • La computadora es un medio de comunicacion moderno?
    8·1 answer
  • Which of the following information would best be displayed throughout the use of a time line
    11·1 answer
  • Whereas enterprise network convergence focuses on the consolidation of traditionally distinct voice, video, and data communicati
    14·1 answer
  • An alteration threat violates information integrity. <br> a. True <br> b. False
    13·1 answer
  • What does the history feature in a web browser do
    10·1 answer
  • --concept mapping--
    5·1 answer
  • Define a function that will return the length of a list
    5·1 answer
  • If you walked into a room containing three computers and were told one of them was infected with malware, how would you determin
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!