1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wolverine [178]
3 years ago
6

After selecting multiple calendars, how do you view them in one single calendar? Open the Backstage view and then the Calendar o

ptions. In the Calendar view, click the Home tab, and click Combine. On the Home tab, click the Calendar tab, then the Merge button. In the Calendar view, click the View tab, and click the Overlay button.
Computers and Technology
2 answers:
blsea [12.9K]3 years ago
6 0

Answer:

its D. in the calendar view, click the view tab, and click they overlay button.

Explanation:

i just got it right on edge 2020

Marysya12 [62]3 years ago
4 0

Answer:

d

Explanation:

You might be interested in
Which of the following is an example of hypertext pattern reading?
Murrr4er [49]
A is the correct answer
5 0
3 years ago
What is a cyber crime?<br><br>help
algol [13]

Answer:

cyber crime, also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child p0®n0graphy and intellectual property, stealing identities, or violating privacy. Cyber crime, especially through the Internet, has grown in importance as the computer has become central to commerce, entertainment, and government.

3 0
2 years ago
Read 2 more answers
_____ includes a wide range of applications, practices, and technologies for the extraction, transformation, integration, analys
Alla [95]

Answer:

The answer is "Option a".

Explanation:

The B.I. is a method, methodology, software, and development set that makes raw data usable and relevant, which facilitates improved decision-making and competitive opportunities, and certain choices were wrong, which can be described as follows:

  • In option b, The A.I is uses in the machines, that's why it is not correct.
  • In option c, It is used to analyze the data, which used in business. that's why it is not correct.
  • In option d, It is wrong, because it a part of A.I.
6 0
3 years ago
Dione has created a PowerPoint presentation that has several common nouns, names of products, etc. He is
svetlana [45]

Answer:

D. Add

Explanation:

PowerPoint application can be defined as a software application or program designed and developed by Microsoft, to avail users the ability to create various slides containing textual and multimedia informations that can be used during a presentation. Some of the features available on Microsoft PowerPoint are narrations, transition effects, custom slideshows, animation effects, formatting options etc.

In this scenario, Dione has created a PowerPoint presentation that has several common nouns, names of products, etc. He is running Spell Checker and does not want to be notified in regard to these words in this presentation or in any other presentation created on this computer. Hence, the option he should choose is Add. This would be used to automatically add a list of all the common nouns.

3 0
2 years ago
Read 2 more answers
Examination of Internet records in order to reveal the identity of an anonymous poster is defined as
Sergeu [11.5K]

Answer: Doxing

Explanation: Doxing which is also referred as doxxing is defined as the revealing or publishing of the private records or information to the public.It is considered as the illegal practice which is base on the the internet service.The publicizing of the private data or confidential information is punishable offence.

Other options are incorrect because filtering is the elimination of the not required content, spamming is the activity of sending undesired bulk messages and hacking is the attacking of the system using false means to corrupt and steal data.Thus the correct option is doxing.

6 0
3 years ago
Other questions:
  • You run an automobile selling company that has a popular online store on AWS. The application sits behind an Auto Scaling group
    6·1 answer
  • An IP address in the form 197.169.100.1 is called a(n) ________. dotted quad encryption key random number sequential access numb
    7·1 answer
  • Programmers should strive to _____. increase coupling increase cohesion both of the above neither a nor b
    7·1 answer
  • The nl2br() function can be used to convert new line entries in a text area into html ________________ tags.
    13·1 answer
  • A ________ database state is one in which all data integrity constraints are satisfied
    15·2 answers
  • Please help! Answer this question if you know computer science very well. I need help with computer science.
    13·1 answer
  • Something I should look for when trying to decide if a source is credible is the publication's ....
    10·1 answer
  • The excerpt is a sample works-cited list.
    5·2 answers
  • Cloud architects have been largely replaced by ScrumMasters.<br><br> True<br><br> False
    15·2 answers
  • DRAW A FLOWCHART THAT WILL ASK THE USER TO ENTER AND DISPLAY THEIR PERSONAL DETAILS SUCH AS NAME AND AGE.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!