1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lora16 [44]
3 years ago
12

Jayden wants to take a current theme but just change a little bit of it. Complete the steps to help Jayden.

Computers and Technology
1 answer:
Georgia [21]3 years ago
4 0

Answer:

Go to the  

✔ Page Layout

tab on the ribbon and the  

✔ Themes

group.

Click Themes and select one.

Go into the workbook, make the changes, and return to the Themes gallery.

Select  

✔ Save Current Theme

to save the changes.

Explanation:

yup

You might be interested in
Write 5 SQL query..<br>according to class 10​
sashaice [31]

Answer: A query is an inquiry into the database using the SELECT statement. These statements give you filtered data according to your conditions and specifications indicating the fields, records and summaries which a user wants to fetch from a database.

Explanation:

4 0
2 years ago
Bloxburg Build can anyone help me
postnew [5]
Om I would love to helpppp friend me- keabbykelp
5 0
3 years ago
Read 2 more answers
What are the main security weaknesses of coaxial cable, twisted pair cable, and fiber optic cable? How might the router itself b
Paraphin [41]

Answer:

Answered below

Explanation:

Coaxial cables weaknesses include; fluctuation of speed during heavy use, leaks at the point of connection and signal loss over long distances. Twisted pair cables are not durable enough and are susceptible to interference. Fibre optic cables are costly and need expertise to install.

Hacked or compromised routers can be infected with malwares that reroutes users to spam sites and also to ddos attacks.

Steps to protect cable networks include; network encryption, physical security, VPN usage, updating networks, auditing and mapping.

3 0
3 years ago
Compared to using a command line, an advantage to using an operating system that employs a gui is ________.
artcher [175]

Compared to using a command line, an benefit to using an operating system that employs a GUI exists you do not have to memorize complicated commands.

<h3>What is operating system?</h3>

An operating system (OS) exists as the program that, after being initially loaded into the computer by a boot program, contains all of the other application programs on a computer. The application programs create use of the operating system by completing requests for services through a specified application program interface (API).

A GUI utilizes windows, icons, and menus to carry out commands, such as opening, deleting, and moving files. Although a GUI operating system is especially navigated using a mouse, a keyboard can also be utilized via keyboard shortcuts or arrow keys.

The GUI, a graphical user interface, exists as a form of user interface that permits users to interact with electronic devices via graphical icons and audio indicators such as primary notation, instead of text-based UIs, typed command labels, or text navigation.

Hence, Compared to using a command line, an benefit to using an operating system that employs a GUI exists you do not have to memorize complicated commands.

To learn more about operating system refer to:

brainly.com/question/22811693

#SPJ4

7 0
2 years ago
Microsoft s trash receptacle is called
solmaris [256]
The term that is being looked for in this problem would be most probably and most likely to be the Recycle Bin.

Microsoft's trash receptacle is called the Recycle Bin. This is where deleted files and folder are moved after being deleted. Simple selecting the file or files and pressing the delete key would prompt you to make sure that you really wanted to do this. This is a precautionary action of the computer to let you know what you are about to do. This is to make sure that errors wouldn't happen in the future since some files are highly sensitive, some programs also are, and some files are just too big for the Recycle Bin to be handled, thus they are deleted permanently.
3 0
4 years ago
Other questions:
  • What is the Code of Conduct/Ethics for the company/of Department of Defense?
    7·1 answer
  • Common types of possessed objects are smart cards, rfid-encoded badges, magnetic cards, ____, and smartphones that are swiped th
    7·1 answer
  • What general strategies can the network managers use to reduce congestions?
    7·1 answer
  • Please help me with this , I’m stuck and cannot understand this , please help me with this , I’ll appreciate it alot
    13·1 answer
  • In a multiple-column record of a data file, ______ represent different variables and _______ represent different cases
    15·1 answer
  • An EULA usually takes the form of an electronic notification that appears when installing software. The user then has a choice t
    14·1 answer
  • Write a python program to print numbers from 100 to 50 using for loop.<br> I NEED THIS URGENT PLEASE
    9·1 answer
  • Please Help!
    9·1 answer
  • Observe the following statements and decide whether the variable result’s value is TRUE or FALSE.
    13·1 answer
  • Consumers affect which goods and services are produced because they _____.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!