1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
avanturin [10]
3 years ago
15

Which components exist in the contextual tab for tables called Design? Check all that apply.

Computers and Technology
2 answers:
aleksklad [387]3 years ago
5 0

Answer:

Table Styles

Properties

Tools

External Table Data

Table Styles Options

Explanation:

just finished the assignment smh

aliya0001 [1]3 years ago
4 0

Answer:

1,3,4,6,7

Explanation:

It's on edge. The other answer is also right i just thought this would be nice for the people who would rather not read.

You might be interested in
In addition to telling you which programs are currently running, what other information does the task bar display
faust18 [17]

I've got task manager open right now; it shows you

  • Applications
  • Processes
  • Services
  • Performance
  • Networking
  • Users

(In that order)

6 0
3 years ago
Two parter:
sashaice [31]

Answer:

This is an infinite loop.

Explanation:

The while loop while never end since the last statement inside the while loop will continue to decrement the value of num by 1 and the condition num < 9 will always be true.

So either change the condition of the while loop like: num > -9

or start incrementing the variable num in the last statement of the while loop like:

num = num + 1

Note: Don't make both changes at the same time.

Visit: gotit-pro.com for fastest, top-notch and impeccable homework and exams help in a range of subjects and ace your academics.

Thanks and Best Regards: Your Friendly Study Co-Pilot

6 0
3 years ago
Why is network security important? Check all of the boxes that apply. A. Network security allows organizations to continue to fu
serious [3.7K]

Answer:

A. Network security allows organizations to continue to function.

C. Network security keeps intruders out of the network.

D. Network security prevents personal information from getting into the wrong hands.

Explanation:

Network security is a very important concept in networking. Mitigating cyber attacks like key logging, malicious software attacks, reconnaissance attacks, DOS attacks etc, have saved so many companies from bankruptcy and death.

Security in networks helps to prevent attackers from obtaining user personal information like Bank detail, health history etc.

5 0
3 years ago
Which of the following is the system of rules and structure governing
Whitepunk [10]

The system of rules and structure which governs language is generally referred to as: C. grammar.

<h3>What is language?</h3>

A language simply refers to a structured system of communication through which living organisms, especially humans share information among themselves, especially through the use of spoken words and sounds.

In English language, grammar is the system of rules and structure which governs the use and composition of language.

Read more on language here: brainly.com/question/781903

#SPJ1

8 0
2 years ago
Juan is a network administrator and must set up a VPN for his company's network. To allow safe communication, he should
Mekhanik [1.2K]

Answer:

select Control Panel, then Network Protocols, then Internet

4 0
3 years ago
Other questions:
  • In Java, it is possible to create an infinite loop out of while and do loops, but not for-loops. true or false
    11·1 answer
  • How a computer encodes text, how it is processed and how computer data is represented.
    6·1 answer
  • - If we place records from different tables in adjacent____________, it would increase efficiency of a database.
    14·1 answer
  • Image
    9·1 answer
  • According to the "multiple-selves" theory, of an online DVD rental service could offer same-day deliveries, so that people who o
    9·1 answer
  • I am doing 7th grade coding 3.02 assignment can anybody help me it says bad input on line 3 and this is what it is can someone h
    6·1 answer
  • How are actual rocket launches similar to how balloon rockets and canister rockets launch?
    6·1 answer
  • Please help this is a coding assignment I need help! (use python)
    12·1 answer
  • You use a Windows desktop system to edit and produce audio files. Your system has two hard disks installed. Your applications ar
    10·1 answer
  • A malicious actor is preparing a script to run with an excel spreadsheet as soon as the target opens the file. the script includ
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!