1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zolol [24]
3 years ago
9

Robyn needs to ensure that a command she frequently uses is added to the Quick Access toolbar. This command is not found in the

available options under the More button for the Quick Access toolbar. What should Robyn do?
Access Outlook options in Backstage view.
Access Outlook options from the Home tab.
Access Quick Access commands using the More button.
This cannot be done.
Computers and Technology
1 answer:
Fynjy0 [20]3 years ago
8 0

Answer: c- Access Quick Access commands using the More button.

Explanation:

You might be interested in
Which of the following is NOT a fixed expense?
suter [353]
Movie tickets because you might not go to the same amount of movies every month
4 0
3 years ago
Device that converts sound into electrical signals, which are sent to the computer or other recording device
belka [17]
<span>D.sound card is the Answer</span>
3 0
3 years ago
To move the first line of text over five spaces and leave the other lines of the paragraph aligned to the left, use the _____ fe
Lera25 [3.4K]

To move the first line of text over five spaces and leave the other lines of the paragraph aligned to the left, use the FIRST LINE INDENT.

<h2>Your answer would be B. First Line Indent</h2><h3><u><em>hope this helps</em></u></h3>
4 0
3 years ago
Read 2 more answers
. The first step in devising security services and mechanisms is to develop a security policy True False
Evgen [1.6K]

Answer: True

Explanation: For the creation of the security services and function the first step is having a policy regarding the security measure that is to be taken.Security policy consist of the procedures and function that should be implement in the system as a plan.

It monitors the flow,accessing of external component ,data assessment etc fro the protection.After the policies are made then the implementation take place. The most common deployment of this policy is in information technology(IT)sector .Thus, the given statement is true..

5 0
3 years ago
______ includes websites that encourage interaction and connection among people, businesses, and organizations.
Sav [38]
Social Media is right I think. 
4 0
3 years ago
Read 2 more answers
Other questions:
  • Which diagrams represent how roles can affect careers and lifestyles
    11·1 answer
  • Many shops are simply plugging up their drains to keep from inadvertently violating the law and creating environmental contamina
    15·1 answer
  • Write a program that asks the user to enter a number within the range of 1 through 10. Use a switch statement to display the Rom
    13·1 answer
  • How does Hadoop work? It breaks up Big Data into multiple parts so each part can be processed and analyzed at the same time on o
    5·1 answer
  • Your task in this assignment is to exploit the race condition vulnerability in the above set-uid program. more specifically, you
    14·1 answer
  • Is instant messaging a form of synchronous communication
    10·1 answer
  • Which of the following people choose a career path for the right reasons
    12·2 answers
  • Which scenario is invalid for execution by unit Tests? A. Executing test scenarios for negative test scenarios.B. Executing meth
    5·1 answer
  • How to get the home button on your screen?
    13·1 answer
  • Create an application that determines the final cost of food items and non-food items, assuming only non-food items are taxed. T
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!