1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MrRa [10]
3 years ago
6

How do you add Rulers to a document?: *

Computers and Technology
1 answer:
swat323 years ago
4 0

Answer:

a. click on View, then ruler

Explanation:

If you want to add ruler to the document following is the procedure to do it:

Click on View.

Then check the ruler in the group called show.

You will get the ruler in your document.You can also remove it by unchecking the ruler box.

Ruler is used to measure and line up objects.

Hence the answer to this question is option A.

You might be interested in
Compare and contrast between first and second generation of computer<br>​
noname [10]
Frist gen of computers took forever to load and would crash if someone els in the house picked up the phone now adays are computers are in our pockets. There our phones and they rarely if ever crash
8 0
3 years ago
What is pure substance ​
nlexa [21]

Answer:

i don't know

Explanation:

I don't understand

4 0
2 years ago
People can use computers for sending ....... writing reports, listening to music and playing games. ​
Alex777 [14]

Answer:

the answer is messages, emails, texts

Hope This Helps!!!

3 0
3 years ago
Read 2 more answers
You have a Direct Mapped cache with following parameters
cupoosta [38]
Yes... so it would be 134 seeing as, 128 and 4 both common denominators.. and the offset would be to the 40%
5 0
3 years ago
The penalties for ignoring the requirements for protecting classified information when using social networking services are ____
Sloan [31]

Answer: the same as

Explanation: Sensitive information are usually tagged as classified and as such only individuals with the necessary security clearance have access to information of these sort. The sensitivity of these information stems from the damage that could ensue from it's leakage. Those found culpable could be sued for various degree of criminal offenses. The rules binding the rules, regulation and protection of these sensitive information is similar to those binding on other dissemination methods. This may be due to the degree of chaos and it's leakage through any channel of dissemination could be damaging. Penalties if found guilty may range from imprisonment, demotion, termination of appointment and so on.

3 0
3 years ago
Other questions:
  • Define a function CoordTransform() that transforms its first two input parameters xVal and yVal into two output parameters xValN
    6·2 answers
  • After execution of the code fragment
    8·1 answer
  • What command launches the remote desktop client for windows?
    12·1 answer
  • The marketplace is the essence of which of the following?
    11·1 answer
  • A popular encryption method used to protect data that travel over a wireless network is ___
    15·1 answer
  • Trish has bought a new computer, which she plans to start working on after a week. Since Trish has not used computers in the pas
    12·2 answers
  • Difference between ancient and modern mode of information <br> transmission
    12·1 answer
  • Aaron opens a bicycle store. Which of the
    12·1 answer
  • Which generation of computer is most popular and why?
    9·1 answer
  • A __________is a software program that appears to be a physical computer and executes programs as if it were a physical computer
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!