1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
agasfer [191]
3 years ago
14

Rafael needs to add a title row to a table that he has inserted in Word. What should he do? Use the alignment options. Use the M

erge and Center option for all the cells in the top row. Use the Merge and Center option on the first two cells in the top row. none of the above
I'll mark brainliest
Computers and Technology
2 answers:
raketka [301]3 years ago
6 0

Answer:

Answer is C

Explanation:

cluponka [151]3 years ago
5 0

Answer:

c

Explanation:

You might be interested in
You don't have policies that force settings for the look of users' computer desktops. Each user's chosen desktop settings are ap
tiny-mole [99]

Answer:

Option b is correct

Explanation:

For example, setting user config. Per user on a Microsoft computer

Go to config. Setting in the group management policy

Locate admin template, click group policy and enable the loop back policy.

This policy helps the computer to use set of GPO for users who log on to computers affected by this policy and this application is supported only in environment with active directory.

8 0
3 years ago
Read 2 more answers
Suppose you wanted to run a web server or ftp server from your home. what type of ip address would you want?​
DanielleElmas [232]
COMPUTER IP ADDRESS IS NEEDED TO RUN WEB BROWSER FROM HOME
5 0
3 years ago
What do you think that private information like passwords pin number will be guarded or shared with the public? why?
konstantin123 [22]

The private information like passwords pin number will be guarded or shared with the public because it gives the first line of defense where it can act against any form of unauthorized access to a person's computer and personal information.

<h3>Why should you use passwords to protect private information?</h3>

Passwords is known to be that factor that tends to give the first line of defense against any form of what we call illegal access to your computer and also that of one's personal information.

Note that the stronger a password of a person is, the more protected one can say that one's computer will be from any kind of hackers and malicious software.

Therefore one need to or one  should maintain the use of a strong passwords for all accounts that are present on your computer.

Hence, The private information like passwords pin number will be guarded or shared with the public because it gives the first line of defense where it can act against any form of unauthorized access to a person's computer and personal information.

Learn more about passwords from

brainly.com/question/17174600

#SPJ1

4 0
1 year ago
An expression that can’t be reduced any further is:
MakcuM [25]

Answer:

i think it’s b by process of elimination.

a value is just the value of number, fundamental isnt a math term, and variables change so

Explanation:

5 0
3 years ago
Read 2 more answers
Why was unicode invented?
lilavasa [31]
Unicode is a universal computing standard to represent texts in most writing systems. It was invented to store most of the world's characters. It started during 1987. Joe Becker from Xerox was the one who made a proposal for Unicode.
6 0
3 years ago
Read 2 more answers
Other questions:
  • Naseer has inserted an image into his document but needs the image to appear on its own line.
    14·2 answers
  • Truncation is a keyword search technique that helps you find useful variations of a term or terms. You want to find books on the
    5·1 answer
  • Analog signals consists of individual electric pulses that represents bits group together into bytes {True/False}
    13·1 answer
  • The main devices in a rectifier are:
    14·2 answers
  • When public relations professionals make provocative statements in newsgroups to get people to visit an organization's website o
    10·1 answer
  • If you want to learn more about a command, point to its button and wait for the ____ to appear.
    13·1 answer
  • Which field in a Transmission Control Protocol (TCP) header provides the next<br> expected segment?
    5·1 answer
  • 9
    10·1 answer
  • 14. Which of the following information about the ESRT T-teen rating rating is FALSE?
    15·1 answer
  • A central issue of public sharing is:
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!