1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
denpristay [2]
3 years ago
13

What happens? In word 2016 when the home ribbon tab is clicked on ?

Computers and Technology
2 answers:
mixas84 [53]3 years ago
8 0

Answer:

It takes you to the tab where your basic functions like text editing are.

Explanation:

Functions such as font size, font type, text colour, text align e.t.c

RideAnS [48]3 years ago
5 0

When you clicked on the ribbon tab in word 2016, you'd be brought to the home tab, where all of the basic controls are displaced for you to see.

Hope I could help! :)

You might be interested in
I store data that the CPU needs. What am I?
Citrus2011 [14]

Answer:

Memory

Explanation:

Memory send commands to the CPU . Alternative modes of memory exist, and each one of them plays an essential role in operating a software machine.Memory is commonly called storage. Either the storage is unstable or non-volatile.

4 0
3 years ago
Read 2 more answers
You realize your computer has been infected with malware. It seems as if someone is controlling your computer from a remote loca
lara [203]

Answer:

Worm malware

Explanation:

The worm operates destructively as it replicates itself and keeps spreading within a computer or network. It takes advantage of software and security vulnerabilities.

Once a computer or network is infected, worms replicate themselves, therefore using up the computer and network resources. Among others, one of the major missions of worms is to create a backdoor into a network, to be able to enable the attacker to carry out a more devastating attack.

Since worms take advantage of weak security in the Operating system, it is very important to constantly update the security features of the Operating system. Users must be careful of the emails they open and attachments they download.

6 0
3 years ago
What are the three different categories of the types of rule ?
slamgirl [31]
Depends on what rules your talking about
3 0
3 years ago
An employee clicks on a link in an email from what looks like a fellow employee and is taken to a fraudulent web site which asks
Fittoniya [83]

Answer:

e. Phishing

Explanation:

Phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.

Attackers use it to steal sensitive user data or information.

5 0
4 years ago
Read 2 more answers
Priscilla is providing the junior analysts, in her firm, on the team with some real-world illustrations to explain some of the r
maksim [4K]

Answer:

d.

Explanation:

Based on the information provided within the question it can be said that the best reason in this scenario would be that the client has a number of very distinctive security requirements. A client with very clear and distinct security requirements would best be bypassed and satisfied by making an in-house software development that does not require outside access.

8 0
4 years ago
Other questions:
  • A security administrator is required to submit a new csr to a ca. what is the first step?
    11·1 answer
  • You can use the bash shell to redirect standard output or standard error from the terminal screen using the ____ shell metachara
    15·1 answer
  • Several days a week, usually between 8:00 a.m. and 9:00 a.m., users complain of MWI problems. Some have new messages, but their
    11·1 answer
  • Write a function so that the main program below can be replaced by the simpler code that calls function mph_and_minutes_to_miles
    7·1 answer
  • Which statement is true of Web-based social media?
    12·1 answer
  • Moving laterally within a network once an initial exploit is used to gain persistent access for the purpose of establishing furt
    10·1 answer
  • CLS <br> N = 1<br> FOR J = 1 TO 5 <br> PRINT N<br> N = 10*N+1 <br> NEXT J<br> END
    14·1 answer
  • Clarissa is a computer programming consultant. When a client states that they have an extremely complex programming task, which
    10·2 answers
  • 7. Which cipher is based on the clues of the physical factors, rather than the hardware or a software cryptosystem
    8·1 answer
  • What is the difference between electrical and electronic devices?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!