1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zolol [24]
3 years ago
9

Robyn needs to ensure that a command she frequently uses is added to the Quick Access toolbar. This command is not found in the

available options under the More button for the Quick Access toolbar. What should Robyn do?
Access Outlook options in Backstage view.
Access Outlook options from the Home tab.
Access Quick Access commands using the More button.
This cannot be done.
Computers and Technology
1 answer:
Fynjy0 [20]3 years ago
8 0

Answer: c- Access Quick Access commands using the More button.

Explanation:

You might be interested in
A major retailer wants to enhance their customer experience and reduce losses
Mrac [35]

Answer:

Predict Demand

Explanation:

The type of Artificial Intelligence (Al) solution that would be suitable for solving this problem is "Predict Deman"

By predicting the demand of the potential consumer through the Artificial intelligence solution the retailer would be able to eliminate leftover out-of-stock scenarios because the adequate quantity of the products or demands will be provided thereby enhancing customers' experience arising from out-of-stock scenarios and reducing losses arising from the leftover.

5 0
2 years ago
Which type of chart is best for highlighting trends in data?
STALIN [3.7K]
Pie chart I believe that is the right answer

8 0
3 years ago
Read 2 more answers
Fill in the blanks:In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human _______
lord [1]

Answer:

In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human <u>weaknesses </u>  by inducing victims to interact with a digital device in a way that is not in their best interest. Many of these attacks begin with<u> spam</u> , which is defined as unsolicited messages that are usually sent in massive numbers using electronic mail systems. A spam  <u>filter</u> uses a set of rules to examine email messages and determine which are spam. There are four common types of spam filters.<u> Content  </u>filters examine the content within a message for certain words or phrases commonly used in spam emails.<u> Header</u> filters review the email header for falsified information, such as spoofed IP addresses. <u>Blacklist</u> filters block mail that originates from IP addresses of known spammers. <u>Permission </u>                    filters block or allow mail based on the sender's address. <u>Phishing</u> is an email scam that masquerades as a message from a(n) legitimate company or agency of authority, such as the IRS. <u>Pharming</u> redirects Web site traffic to fraudulent Web sites that distribute malware, collect personal data, sell counterfeit products, and perpetrate other scams. A rogue <u>antivirus </u>                exploit usually begins with a virus warning and an offer to disinfect the infected device. Some software is not exactly malware, but it is a nuisance. A <u>PUA </u>takes up residence on a digital device and seems impossible to disable or remove.

3 0
3 years ago
13. An Internet Service Provider (ISP) is a company that builds the routers and wired connections that allow individuals to acce
valentinak56 [21]

Answer:

C. redundant networks are more reliable.

Explanation: I just got a 100 on a test and that question was asked.

7 0
3 years ago
______ is the code that a user writes in order to create a document to display on the web
icang [17]

HTML(Hyper Text Markup Language) is the code that a user writes in order to create a document to display on the web.

Explanation:

HTML is a markup language used to create hyper texts that are platform-independent. Mark up feature can be linked to other web pages, e-mail, multimedia, documents, databases etc.

Tags are used in to identify each section like head, body, title, paragraphs, tables, images etc.

5 0
3 years ago
Other questions:
  • Personal Web Page Generator Write a program that asks the user for his or her name, then asks the user to enter a sentence that
    11·1 answer
  • Given this method comment, fill in the blank in the method implementation. /* Deposits money into the bank account amount: the a
    6·1 answer
  • The principal objectives of computer security are to prevent unauthorized users from gaining access to resources, to prevent leg
    11·1 answer
  • Your sister is considering purchasing a tablet computer that utilizes RT as the
    11·1 answer
  • Write an HTML document which contains two text fields, a button, and a div. The first text field should be labeled “Temperature”
    10·1 answer
  • 1.What is the term referring to an amount of money that is owed?
    6·2 answers
  • PLEASE HELP I FAILED TWICE AND HAVE ONLY ONE MORE TRY BEFORE MY GRADE ARE SET I AM CRYINGGGGG PLEASEEE IM BEGGINGGGGG
    10·1 answer
  • Why computer literacy is vital to access in business work
    7·1 answer
  • What is the initial step to exploring solutions to a problem?
    15·2 answers
  • The shapes of AND, OR, and NOR gates have something in common. What is it and why do you think they share that feature?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!