1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bogdanovich [222]
3 years ago
6

When creating a shape in Word, what are some available options? Check all that apply. adding text to the shape changing the size

of the shape changing the location of the shape changing the types of sizing handles hiding the shape so you cannot select it
Computers and Technology
1 answer:
netineya [11]3 years ago
8 0

Answer:

adding text to the shape

changing the size of the shape

changing the location of the shape

Explanation:

A word is can be regarded as graphical word processing program on the computer which can be used by users to type and to save documents. The word also has alot of useful tools with TABs such Insert, pagelayout, Design and others. It was developed by Microsoft corporation.

To create shapes in words, these step can be taken;

✓click "insert" at the interphase

✓Then look for "shapes" and select the needed shape.

✓To draw the shape, it should be clicked then drag holding the mouse.

✓after drawing, any modifications can be made, text can be added and lots more.

It should be noted that When creating a shape in Word, some of available options are;

✓adding text to the shape

✓changing the size of the shape

✓changing the location of the shape

You might be interested in
All of the following are eras in IT infrastructure evolution except the​ ________. A. general purpose mainframe and​ mini-comput
Digiron [165]

Answer:

C: disruptive technology era

Explanation:

There are five main stages in IT infrastructure era and the are, in order from the oldest to the newest; the mainframe and minicomputer era, the personal computer era, the client/server era, the enterprise era, and the cloud computing being the newest in the five stages eras of IT infrastructure.

7 0
3 years ago
A _____ system allows a customer to request a fax using email, via the company website, or by telephone.
balu736 [363]

A faxback system allows a customer to request a fax using email, via the company website, or by telephone.

<h3>What is faxback?</h3>

Faxback (usually uncountable, plural faxback) An interactive electronic service permitting documents to be downloaded via fax machine. FaxBack searches a pre-assigned database to validate numerals provided while at the same time recovering a caller's name and fax number. Callers without an account can hear a message in- structing them on how to receive an account or be given the option of furnishing a credit card.

FaxBack Fax Machine Solutions add features to the fax machine equivalent to how VoIP added components to the phone: receive fax notification via email and track, archive, and manage faxes via the fax server or service provider control panel.

Hence, A faxback system allows a customer to request a fax using email, via the company website, or by telephone.

To learn more about faxback refer to:

brainly.com/question/13735750

#SPJ4

4 0
1 year ago
Windows Hello supports multiple biometric authentication methods, including facial recognition. What is the failsafe method to a
Orlov [11]

Answer:

The failsafe method when facial recognition method is unavailable is the Personal Identification Number (PIN) method.

Explanation:

The Personal Identification Number (PIN) option is available for setup for cases when other biometric authentication methods fail due to several reasons.

6 0
3 years ago
Your company has decided to implement a wireless network. The wireless network users must be able to connect to resources on you
Brums [2.3K]

Options:

A Infrastructure mode

B Ad hoc mode

C a wireless access point

D static IP addresses

E APIPA

Answer:

A. Infrastructure mode

C. a wireless access point

Explanation: A DHCP is a server that makes use of s standard protocol called dynamic host configuration protocol to automatically assign internet protocol (IP) addresses and other computer parameters to clients. It gives them the opportunity to effectively make use of other network services such as DNS( domain name system) and NTP(network time protocol).

8 0
3 years ago
Northern Trail Outfitters stores Last Name in a data extension. How should the text file be defined?
Crazy boy [7]

Answer:

d. Text(100)

Explanation:

The data extensions can be defined as the table with the fields of the data about contacts. It can be related to some other data extensions or can be a standalone.

In the context, the Northern Trail Outfitters stores the Last Name in the data extension which is defined as a text file as Text(100).

Choosing a proper field length and a data type ensures an efficient storage as well as retrieval of the data in the data extensions.

7 0
3 years ago
Other questions:
  • Your computer has two basic types of software: system software and ________ software.
    9·1 answer
  • Here is a Test Code segment:
    13·1 answer
  • X = 0
    15·1 answer
  • Which security control is most helpful in protecting against eavesdropping on wireless LAN (WLAN) data transmissions that would
    6·1 answer
  • What does my name look like in binary code, btw my mane is Wendy Alexis Morales
    10·2 answers
  • Individual internet users connect to isps through a(n ________.
    11·1 answer
  • Genetics Vocabulary: no <br> Allele: Different versions of the same qene (Aa, Bb)
    11·1 answer
  • People of brainly Just a quick warning that there is a group of people posting links with virus.
    11·2 answers
  • What component of a game makes victories feel earned and helps the player become physchologically engaged by the play experience
    11·1 answer
  • Which of the following terms refers to the cells that contain values and labels to be graphed in the chart?.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!