1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
solmaris [256]
3 years ago
8

Mary is writing an article about the animal kingdom. She wants to place an image below the text. Which menu should Mary choose f

or this purpose?
Computers and Technology
1 answer:
lakkis [162]3 years ago
5 0

Answer:

The answer to this question is given below in the explanation section.

Explanation:

This question is about how to insert caption or text below the image. Marry have to follow the following steps:

  1. Open the article in MS Word
  2. Select the image to insert the text below it.
  3. Then go to the References menu
  4. Under the reference group, click on the insert caption button
  5. a popup, windows will get open, fill in it the required detail.

If you want to insert the image below the text, then you have to follow the following option.

  1. Select the text where you want to insert the image
  2. Go to insert men
  3. Under the Illustration group of menu, click on pictures button, or online pictures button and select the image and click ok.
You might be interested in
A device that protects electronic equipment from an increase in power, but not a decrease or outage is a ___.
Basile [38]

Answer: A) Battery backup

Explanation:

 A battery backup are used to provide the source of power backup to various hardware components and desktop computers. In many cases, the devices are plugged into UPS ( uninterruptible power supply) for backup power and it is also depend upon the size of the UPS.

All the battery backups are located inside so that is why, the devices are heavy in weight. Usually, the battery backup front required additional button for performing various functions.

And the battery backup devices are manufacture by using the varying degree of backup abilities.

8 0
3 years ago
Before a program written in c can be executed on a computer, what step is required to be done first?
sergejj [24]
It should be compiled. It won't work if it's not compiled.
6 0
4 years ago
A band wants to know what their most popular CD is so that they can have more copies made to sell. Which statistical measurement
Bad White [126]

This would be Ordinal measurement.

8 0
3 years ago
Read 2 more answers
what is the name of the fields in an x.509 digital certificate that are used when the parties negotiate a secure connection?
Zigmanuir [339]

Answer:

Image result for what is the name of the fields in an x.509 digital certificate that are used when the parties negotiate a secure connection?

Common applications of X. 509 certificates include SSL/TLS and HTTPS for authenticated and encrypted web browsing, signed and encrypted email via the S/MIME protocol, code signing, document signing, client authentication, and government-issued electronic ID.

Explanation:

8 0
3 years ago
Becca is working on a program that will store data. The program will need quick access to data and data persistence is not impor
borishaifa [10]

Based on the information given the data should be stored in flash memory.

<h3>What is flash memory:</h3>

Flash memory is a memory storage space that is used to store data or information on a computer.

Flash memory is vital as it help to retain information or data that are stored on a computer after power is removed which inturn means that store data can be retrieve when needed.

Example of flash memory are:

  • CompactFlash  
  • Memory Stick
  • BIOS chip etc

Inconclusion the data should be stored in flash memory.

Learn more about flash memory here:brainly.com/question/6835146

7 0
2 years ago
Other questions:
  • Switches operate on what layer of the OSI Model
    11·1 answer
  • What is data anayltics
    5·1 answer
  • Technologies designed to replace operating systems and services when they fail are called what?
    15·1 answer
  • 2.1. The stream cipher described in Definition 2.1.1 can easily be generalized to work in alphabets other than the binary one. F
    10·1 answer
  • What is a characteristic of maintaining logs in a system? A. Logging prevents security violations, but only deals with passive m
    10·1 answer
  • How can you assess a website for currency?
    14·2 answers
  • Brody is concerned that he is going to exceed the quota set for his mailbox. Where should he go to access the Mailbe
    10·1 answer
  • What is the first phone ever made?
    6·1 answer
  • Which of the following is NOT a possible combination of values of the variables in this program when it finishes running?
    6·2 answers
  • How do you create a CA file? short answer
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!