1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bas_tet [7]
3 years ago
13

What can provides access to the only menu in office 2007​

Computers and Technology
1 answer:
worty [1.4K]3 years ago
3 0
As is known, there is no File Menu in Office 2007/2010/2013's Ribbon. If you want to get File Menu, the only method is to find out original File Menu items in Ribbon.
The file menu
You might be interested in
What is the result of the following code fragment?
anastassius [24]

Answer:

D

Explanation:

I don't know the language, but it is clear what is going on.

It looks like you are defining a value for a in both commands.

a.multiply(b); looks like you take the value in a (which is 10) multiply it by 25 and put the result back in a. So so far we have 10 * 25 = 250

Note the next command

a.add(b)

looks like you take the current value in a(which is now 250)

and put the value of b (which has not been changed. It is still 25) and put that in a (which is 250).

The result is 250 + 25 = 275

The answer is D. Since I only understand the logic, if this answer is wrong, I wish you'd leave a note.

4 0
3 years ago
Explain what a honeypot is. In your explanation, give at least one advantage and one disadvantage of deploying a honeypot on a c
tatuchka [14]

Answer:

A honeypot is a computer network set up to act as a decoy to track, deflect, or research trying to obtain unwanted access to the information system.

Explanation:

A honeypot is a device or device network designed to imitate possible cyber-attack targets. It can be utilized to detect or deflect assaults from a legitimate military target. It may also be used to collect knowledge on how cybercrime works.

<u>Advantage:- </u>

  • Data Value:- One of the challenges faced by the research community is to obtain meaning from big data. Companies hold large quantities of data daily including firewall logs, device logs, and warnings for vulnerability scanning.
  • Resources:- The problem facing most protection systems is resource shortages or even the depletion of resources. Power saturation is when a protection asset can no longer work since it is overloaded by its assets.
  • Simplicity :- I find simplicity to be the biggest single strength of honeypots. No flashy techniques are to be created, no stamp computer systems to be managed, no rule units to be misconfigured.

<u>Disadvantage:-  </u>

That honeypot doesn't replace any safety mechanisms; they just operate with your overall security infrastructure and improve it.

4 0
4 years ago
What happens to the files and folders on the desktop when the computer is turn off
andriy [413]

Answer:

All of the files are stored on a hard-drive. Except for the files you just viewed before turning off the computer, which is stored in the RAM (Random Access Memory). If your computer is a desktop, and the power goes out while looking at a photo/pdf, you may corrupt/lose the image if the computer didn't have enough time to store it in the hard drive. Everything in the hard drive is 'scratched' into it like a record. If you delete a file, that part of the disk is 'smoothed' as best as it can. If you upload another file, you might corrupt/ruin the image/pdf. Think of the smoothing like recording a football game over an old VHS of Winne the Pooh. If you have any other questions, please ask by commenting on this answer!

4 0
3 years ago
What is the result of a network technician issuing the command ip dhcp excluded-address 10. 0. 15. 1 10. 0. 15. 15 on a cisco ro
Hunter-Best [27]
The answer to this question is 83774838473773
3 0
2 years ago
7+9 help me pleas i dont know help now
natali 33 [55]

Answer:

16

Explanation:

because it is

4 0
3 years ago
Read 2 more answers
Other questions:
  • Once Raul selects a technology solution, he has completed the process. <br> a. True<br> b. False
    13·2 answers
  • Which of the following enabled mass production in the 1920s? a.standardization of spare parts b.mass availability of electricity
    7·2 answers
  • Methods used to change variables are called ______. equals accessors toString void mutators
    8·1 answer
  • Given two models applied to a data set that has been partitioned, Model A is considerably more accurate than model B on the trai
    7·1 answer
  • What is a relationship between a object and a class?
    7·1 answer
  • Had you guys go to prom by yourself or someone in your senior class
    5·2 answers
  • Does paste link Always increases the size of the referenced document ?
    14·1 answer
  • What is modularity? Help asap
    9·1 answer
  • What is software??????​??????????????????
    7·2 answers
  • A)​What would be the state of the following list after each of the first four passes in a Bubble sort, sorting into ascending se
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!