1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
denis-greek [22]
3 years ago
12

What are the steps to configure user information in a document?

Computers and Technology
2 answers:
chubhunter [2.5K]3 years ago
4 0

Answer:

file, properties, options, general

Explanation:

aleksandr82 [10.1K]3 years ago
4 0

Answer:

1. file

2. properties

3. options

4. general

Explanation:

Doing it on EDG now!

Good luck :3

You might be interested in
Define print_shape() to print the below shape. Example output:
ella [17]

The print_shape() is an illustration of Python function; whose execution is carried out when the function is called

<h3>The print_shape() function</h3>

The print_shape() function written in Python, where comments are used to explain each action is as follows:

#This defines the function

def print_shape():

   #The following iteration is repeated three times

   for i in range(3):

       #This prints the *** in each iteration

       print('***')

#This calls the function

print_shape()

Read more about Python functions at:

brainly.com/question/15745784

5 0
2 years ago
A computer can manipulate symbols as if it understands the symbols and is reasoning with them, but in fact it is just following
Law Incorporation [45]

Answer:

The symbols may or may not have meaning, but the machine does not need to know how the symbols are interpreted in order to manipulate the symbols in the right way.

Explanation:

The computer can change the symbols in the case when the computer understand but in actual following the cut-paste rules without having any understanding this is because the symbols might be have meaning or not but if we talk about the machine so actually they dont know how the symbols are interpreted and how it can be used so that it can be change in the accurate way

5 0
3 years ago
The dome of Hagia Sophia rests on these curving, triangular features of Byzantine architecture called __________.
kipiarov [429]

Answer:

pendentives

Explanation:

4 0
3 years ago
Data owners ensure that only the access that is needed to perform day-to-day operations is granted and that duties are separated
Akimi4 [234]

Answer:

True

Explanation:

As employees might be accessing business/client data, security of data access is a topmost priority.

8 0
3 years ago
Today you turned on your computer after being on vacation for a week. You see spinning white dots on a black screen. You decide
Andre45 [30]

Answer:

<em>Use Safe Mode to boot</em>

Explanation:

Safe mode uses a <em>limited number of files and drivers to begin Windows in a simple form. If an issue does not arise in safe mode, this means that the problem is not caused by default settings and simple system drivers.</em>

Windows in safe mode helps users to track down the cause of a problem and therefore can enable users to solve problems on the computer.

The steps include:

  1. Reboot your computer.
  2. Click the F8 button before the logo appears on Windows 7 and above.
  3. Using the arrow keys to navigate and select which operating system you would like to boot into Safe Mode if you have more than one operating system installed on the same computer.
  4. Use the arrow keys to select Safe Mode and press Enter.

4 0
3 years ago
Other questions:
  • Consider the following general code for allowing access to a resource:
    13·1 answer
  • A(n ____________ is considered a named collection of bytes having persistent or lasting storage.
    10·1 answer
  • At the dsl local carrier's office, the __________ demultiplexes the data streams and converts them into digital data.
    10·1 answer
  • Create a loop that will output all the multiples of 5 that are greater than zero and less than 60 (do not include 60). 5, 10, 15
    10·1 answer
  • Suppose list1 is an MyArrayList and list2 is a MyLinkedList. Both contains 1 million double values. Analyze the following code:
    8·1 answer
  • What group in the review tab contains the commands and to accept or reject changes made to a document
    14·2 answers
  • To maintain her audience's confidence in her, what should kiara not do while delivering her presentation?
    10·1 answer
  • What are some positive and nevative aspects of technology?
    11·1 answer
  • 7.2 code practice edhesive. I need help!!
    13·1 answer
  • WAp to input the radius and print<br> the area of circle
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!