1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Misha Larkins [42]
3 years ago
5

What are some examples of what can be changed through options available on the mini toolbar

Computers and Technology
1 answer:
kakasveta [241]3 years ago
3 0

Answer:

Italic, underline, indent size, font, font size, format paint, text highlight colors, and font color.

Explanation:

The Mini Toolbar refers a stripped down version of the Font group that is on the Home tab in Microsoft Office.

The Mini Toolbar assist in easily formatting text while a different section of the ribbon is being used without the need to go back to the home tab.

Some examples of what can be changed through options available on the mini toolbar the italic, underline, indent size, font, font size, format paint, text highlight colors, and font color.

You might be interested in
If a database is not maintained or if incorrect data is entered into the database, serious problems can occur. What problems cou
Archy [21]

Database is maintained by keeping only relevant data and updating existing data in a timely manner.

This is achieved by issuing proper insert, update and delete operations.

Incorrect data leads to incomplete information. Databases which hold transaction details, any inaccuracies lead to misinformation to its users.

Both the above lead to serious issues in data maintenance and prove the database ineffective. This indicates manhandling of the database.

No maintenance

Database is maintained when only relevant information is present. Irrelevant information includes information like information of past students, old information of current students, etc.

For students who have completed their courses and left, the database should be updated by removing data of such students.

Also, for newly enrolled students, their enrolment should reflect in the official records.

In case of changes in any of the student information, timely update operations should be performed to keep only current data in the database.

All these operations should be done timely in order to avoid any discrepancies in the real data and updated data in the system.

Incorrect data

In situations where incorrect data is input in the student database, incorrect data will be recorded for that particular student. Incorrect data can be related to ssn, name, address, course details and fees payment.

In case of incorrect transaction details like fees payment, this incorrect data will reflect in the student record as well as will affect the overall earnings of the school.

For enrolled students, correct enrollment details regarding the course and classroom should be recorded. Any error in this data will cause the student inconvenience and the respective student will be at loss.

Also, taking advantage of this situation, any outsider acting as an enrolled student, can gain access to the school.

This leads to mismatch of information and can lead to fraud situations against the educational institute.

3 0
3 years ago
Question 8 OT TU
Semenov [28]
The qualities that are generally required are A. Vision
4 0
3 years ago
Observing users as they enter passwords or other personal information to a computer Auditing software often used to test compute
GuDViN [60]

Answer:

Explanation:

1. Observing users as they enter passwords or other personal information to a computer Auditing software often used to test computer data - (shoulder surfing)

2. An acronym for security institute that studies computer crime activities The act of altering data that are entered into, or used by, a computer --- (CSI)

3. A small text file that stores information about your browsing habits and interests Stealing personal information from trash cans - (COOKIES)

4. A software program specifically designed for computer forensic investigations - (EnCase)

5. A type of fraud in which the perpetrator steals small amounts from many different accounts - (salami technique)

6. A software program or hardware device designed to prevent unauthorized data communications - (firewall)

7. Malicious software similar to a computer virus -- (_worm)

8. Federal legislation aimed specifically at computer crime (CFAA)

8 0
3 years ago
__ is used to provide visual clues that the text is hypertext links rather than normal text.
skelet666 [1.2K]

Answer:

ur mom

Explanation:

6 0
3 years ago
How will you create a blog using Wordpress?​
levacccp [35]

Answer:

yes

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • The set of instructions that tells a computer
    12·2 answers
  • You want to centrally back up the files users store in the Documents folder in their user profiles, but you don’t want users to
    7·1 answer
  • What options does the business user have to manually share individual records? A new custom object is being created with a priva
    10·1 answer
  • Why were american colonists unhappy with king george iii?
    6·2 answers
  • The basic assumption that underlines event driven modeling is that the system can be represented as a model with an infinite num
    9·1 answer
  • Your computer science teacher asks you to sample a black and white image that is 4” x 6”. How would you sample the image to prov
    10·1 answer
  • Anyone know how to fix black screen of death on computer​
    6·1 answer
  • Write a program that displays the average temperature and the annual precipitation for a selected city. The user should be able
    10·1 answer
  • A customer bought a goods for Rs.9,000 after getting 10% discount. Calculate the marked price of the goods.Write in Qbasic.​
    8·2 answers
  • Spreadsheets are sometimes credited with legitimizing the personal computer as a business tool. Why do you think they had such a
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!