1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
White raven [17]
3 years ago
14

How would I view the ruler on my document if it was not visible?

Computers and Technology
2 answers:
Gekata [30.6K]3 years ago
8 0

Answer:

select the icon at the Quick Access toolbar

select the icon at the top of the vertical scroll bar

double click on the Status bar

by using the Zoom slider

Explanation:

youre gonna do that

dolphi86 [110]3 years ago
8 0

Answer:

Select the icon at the top of the vertical scroll bar

Explanation:

above the top arrow of the scroll bar there is a tiny icon that you can click to show or hide the ruler on word 2013.

hope this helps future people who misunderstand as well!

You might be interested in
Im doing a computer project and I would need some help
lisabon 2012 [21]
- Tons of celebrities live in California. You have the kardashians, youtubers and internet stars, musicians, millionaires, etc.

-California is known for gold, silicon, etc.

-Some words that describe California are "economic", "melting pot", "adventurous" "beaches" "Hollywood" "sunny" etc.
6 0
3 years ago
Which model encourages pair programming to improve productivity?
san4es73 [151]

Answer:

Explanation:

Pair programming is an agile software development technique in which two programmers work together at one workstation. One, the driver, writes code while the other, the observer or navigator, reviews each line of code as it is typed in. The two programmers switch roles frequently.

8 0
2 years ago
1byte= ________ bits
ludmilkaskok [199]

Explanation:

1 byte=8bits

1 nibble = 4bits

1MB= 8000000bits

1PB= 1000TB

1ZB= 1000000000000EB

3 0
3 years ago
What does the html5 placeholder attribute provide on a text input
RoseWind [281]

Answer:

b. B is the answer.

Explanation:

5 0
3 years ago
The practice of gaining unauthorized access to a bluetooth device is referred to as:
jok3333 [9.3K]
BlueJacking. It is unclear if the term jack refers to pranking or to hijacking.
6 0
4 years ago
Other questions:
  • Decrypt the message OPEHHISTLWILKWPR which is the cyphertext produced by encrypting a plaintext message using the transposition
    14·1 answer
  • You have recently resolved a problem in which a user could not print to a particular shared printer by upgrading her workstation
    12·1 answer
  • Where can I easily find an easy app or program to use for making/editing videos?
    13·1 answer
  • How can you prevent your VMs receiving DHCP server messages from unauthorized virtual machine pretending to be DHCP servers?
    13·1 answer
  • Write two statements to get input values into birthMonth and birthYear. Then write a statement to output the month, a slash, and
    7·1 answer
  • Does anyone know websites that have free to use images, such as the website "wikimedia"? I like that one the best but it doesn't
    5·1 answer
  • A type of sensor used to detect which way around a device is being held. ​
    7·1 answer
  • Given a sorted list of integers, output the middle integer. Assume the number of integers is always odd. Ex: If the input is: 2
    13·1 answer
  • Why are computer manufacture constantly releases fast computer and do user benefit from ths speed
    9·1 answer
  • You are critiquing a logo design that one of your coworkers proposed. Your sense is that the individual elements of the design a
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!