1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Feliz [49]
3 years ago
9

Using word, which tool are best to place images in word and why

Computers and Technology
2 answers:
stellarik [79]3 years ago
7 0

Answer:

i know

Explanation:

deff fn [24]3 years ago
7 0
<h2>Answer:</h2>

Pictures and Online Pictures option is the tool to place images in word.

<h2>Explanation:</h2>

In the main toolbar, there is an INSERT tab option. Under that tab, Pictures and Online Pictures tab exists. Pictures tab is used to upload pictures from the user system whereas the Online Pictures tab is used to download pictures from the online Internet source and upload the pictures into the word document.

In order to manipulate the picture that is uploaded, there are options like Picture Tools where the layout, effects, borders, change, compress, and reset picture options are available. Once the image is placed in the document, the size can be altered, picture can be dragged.  

You might be interested in
Write the steps for displaying multiple subtotal functions in excel.
Sloan [31]

We can display multiple subtotal functions in excel using the following steps.

<u>Explanation</u>:

Step1: Enter the data you want to add in the excel sheet.

Step2: Select the cell containing the data you want to add.

Step3: Click the Data Tab

Step 4: Now select the SUBTOTAL command in the outline group.

Step 5: An option called ATEACHCHANGEIN will be available.

Step 6: Now select the drop-down menu under that option.

Step 7: After selecting the drop-down menu to select the columns you want to use for the first level subtotals.

By following these steps, we can display multiple subtotal functions in excel.

3 0
3 years ago
What are some limitations when it comes to testing and ensuring program quality? List at
DedPeter [7]

Answer:

the two limitation i can think about is the efficiency like if there are bugs or glitches or if it can get broken into and the second one is if it is running the correct program or not a lot of people deal with this problem.

Explanation: personally these are the two i can come up with at the moment

4 0
2 years ago
Try making a character (string) variable and a logical variable . Try creating a variable with a "missing" value NA. You can cal
quester [9]

Answer:

The solution code is written in R script.

  1. #string variable
  2. character_str<- "Hello World"
  3. #logical variable
  4. logic <-  a > b
  5. #Missing value
  6. myVec <-c(1, 2, 3, NA)
  7. #Use class to check data type
  8. class(character_str)
  9. class(logic)
  10. class(myVec)

Explanation:

A string variable is a variable that hold a string (the letters enclosed within quotation marks) (Line 2)

A logical variable is a variable that hold a logical value (either True or False). The logical value is created by comparing two variables (Line 5).

In R, missing value is an unknown value which is represented by NA symbol (Line 8).  

We can use in-built method <em>class </em> to check for the variable type in R (Line 11-13). For example, the output of <em>class(character_str)</em> is "<em>character</em>"

8 0
3 years ago
Suppose Alice, Bob, and Carol want to use secret key technology to authenticate each other. If they all used the same secret key
HACTEHA [7]

Answer:

No. This is not more secure.

Explanation:

this is not more secure than having all of Carol, bob and Alice having the same key.

alice would be able to know Carol's key for her to be able to verify the answer Carol gave to a challenge by her. she would also have to know bob's key to do the same.

any of these 3 would have to know someone else's secret key to verify answers to any challenge.

the challenge is to know the secret keys if the other two and if done, decryption can easily be done and they can impersonate.

8 0
3 years ago
I used a walmart MoneyCard and now it says its prepaid. Its my dad's card.
Scorpion4ik [409]

Answer:

oh- Did he find out-

Explanation:

8 0
3 years ago
Other questions:
  • The most effective way to perform data entry is to keep your hands on the keyboard and press to move to the text cell in the row
    10·1 answer
  • Design a 4-bit register that can accept an input from the user and store the accepted input. The 4-bit register will operate in
    6·1 answer
  • Susan bought a new sweater on sale for $28.93.she was charged HST of 13%.find the total amount of her bill including taxes.​
    9·1 answer
  • A machine is classified as a compound machine if it?
    8·2 answers
  • The control programs managing computer hardware and software perform the _________ function to control and prioritize tasks perf
    8·1 answer
  • _________ is the process of scanning the network to find out which Internet Protocol (IP) addresses are attached to potentially
    9·1 answer
  • Write an examples of Output device, storage devices and inputs device 10 each excluding the common ones​
    5·1 answer
  • • Two advertisers A and B
    8·1 answer
  • What do developers do to support software products? explain to users which development process model was used to make the produc
    8·1 answer
  • Please what do you guys think about this ?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!