1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kifflom [539]
3 years ago
8

Gemima wants to order the different kinds of food alphabetically on the table. Which actions should she take? Check all that app

ly. Click inside the table. Click on the Sort icon. Choose the descending option. Click the Design tab in Table Tools. Choose the Header Row option in the Sort dialog box.
Computers and Technology
2 answers:
sesenic [268]3 years ago
8 0

Answer:

Click inside the table.

Click on the Sort icon.

Choose the Header Row option in the Sort dialog box.

Explanation:

Are the correct answers

lapo4ka [179]3 years ago
4 0

Answer:

Click inside the table. Click on the Sort icon. Choose the descending option

Explanation:

A well put list in a Microsoft Word table should always be in alphabetical order. If it is not, Gemima can allow Word to do it for her. It is pretty simple. She should click inside the table and select the content she wants to sort. Under the Home ribbon, on the Paragraph tab, She should click the Sort button. A sort dialog box will appear with options to sort her content in Ascending or Descending order. She should be able to choose the descending option. Once finished, She can click OK.

You might be interested in
A(n) _________ is any system resource that is placed onto a functional system but has no normal use for that system. If it attra
Kisachek [45]

Answer:

Honeytoken

Explanation:

Honeytokens (aka honey traps or honeypots) may be described as bogus or dummy IT resources which are created or placed in a system or network for the sole purpose of attracting the attention of cyber-criminals and being attacked. These might be servers, applications, complete systems or datasets which are placed online (via the public internet, or a public-facing gateway to a private network), in order to attract cyber-attackers.

Honeytokens may be specifically defined as pieces of data which on the surface look attractive to potential attackers, but actually have no real value – at least, not to the attacker. For the owners of the tokens (i.e. the people who set the trap), they can be of great value, as they contain digital information which is monitored as an indicator of tampering or digital theft.

8 0
3 years ago
Which of the following is designed to help an organization continue to operate during and after a disruption?
Olenka [21]

Answer:

d

Explanation:

cause people need a care for there incedents that not expected thats why people need help prevent from a risk to save people lives

7 0
3 years ago
You are sending an email to a coworker requesting that the coworker perform a task. Where should you put your coworker's email a
MakcuM [25]
It really would depend on what E-Mail system you're using. 
If say, you're using G-Mail, the Recipient's address would be placed simply in the "To" bar right above the "Subject" bar. 
5 0
3 years ago
name instances in the past where social media has kept you informed about the latest news around the country​
Luba_88 [7]
BLM movement and protests,
The election, school shootings, and the pandemic
3 0
3 years ago
Read 2 more answers
Es el conjunto de manifestaciones materiales, intelectuales y espirituales que distinguen a un pueblo a)Civilización b)Cultura c
GREYUIT [131]

Answer:

a)Civilización

Explanation:

3 0
3 years ago
Other questions:
  • Attention merchants define
    5·1 answer
  • Certain medications can increase risk of obtaining a sunburn true or false
    12·1 answer
  • The CPU package is installed using the ____ process
    7·1 answer
  • hello my friend is doing a give away at 100 followers would you follow him for a chance to win 2000 vbucks his name is ZoVa_Velo
    15·2 answers
  • Impanation stage contain ​
    10·1 answer
  • A string s is a circular shift of a string t if it matches when the the characters are circularly shifted by any number of posit
    9·1 answer
  • GIVING BRAINLIEST Jenna creates advertisements for companies to air on television. Which file format will best preserve the grap
    5·2 answers
  • What is single user operating system? Write two examples.​
    12·2 answers
  • They are correct? thank you!
    6·2 answers
  • What are two reasons to tie cables up and out of the way inside a computer case?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!