1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NikAS [45]
2 years ago
13

How do you insert a table by using standard toolbar?​

Computers and Technology
1 answer:
MissTica2 years ago
5 0

Answer:

Click the Insert Table button on the Standard Toolbar. Drag over the grid that appears to select the number of rows and columns you want. To use automatic formatting, choose Table AutoFormat from the Table menu. Select several Formats from the menu on the left to see how the table will look.

You might be interested in
How fast can the winds blow in a tornado?
sp2606 [1]
Over 200 mph generally now I says 300 mph
6 0
3 years ago
Read 2 more answers
Choose the sentences that describe techniques of formatting text.
OLEGan [10]

I'm sorry if this answer has come to late.

Answer:

She opened her type tool and wrote in 'Happy Thanksgiving at the bottom of the image. She smoothed the edges of the text and changed its color. She then placed the text on a rug and tilted it to create an effect that showed as if the text was written on the rug.

Hope this helps!

8 0
3 years ago
Suppose you want to view a document that has several headings. what view would you use?
bija089 [108]
Um i think outline. :)
5 0
2 years ago
- Consider the relation R = {A, B, C, D, E, F, G, H, I, J} and the set of functional dependencies F = { {B, C} -> {D}, {B} -&
Olenka [21]

Answer:

The key of R is {A, B}

Explanation:

A key can be seen as a minimal set of attributes whose closure includes all the attributes in R.

Given that the closure of {A, B}, {A, B}+ = R, one key of R is {A, B} But in this case, it is the only key.

In order for us to to normalize R intuitively into 2NF then 3NF, we have to make use of these approaches;

First thing we do is to identify partial dependencies that violate 2NF. These are attributes that are

functionally dependent on either parts of the key, {A} or {B}, alone.

We can calculate

the closures {A}+ and {B}+ to determine partially dependent attributes:

{A}+ = {A, D, E, I, J}. Hence {A} -> {D, E, I, J} ({A} -> {A} is a trivial dependency)

{B}+ = {B, F, G, H}, hence {A} -> {F, G, H} ({B} -> {B} is a trivial dependency)

To normalize into 2NF, we remove the attributes that are functionally dependent on

part of the key (A or B) from R and place them in separate relations R1 and R2,

along with the part of the key they depend on (A or B), which are copied into each of

these relations but also remains in the original relation, which we call R3 below:

R1 = {A, D, E, I, J}, R2 = {B, F, G, H}, R3 = {A, B, C}

The new keys for R1, R2, R3 are underlined. Next, we look for transitive

dependencies in R1, R2, R3. The relation R1 has the transitive dependency {A} ->

{D} -> {I, J}, so we remove the transitively dependent attributes {I, J} from R1 into a

relation R11 and copy the attribute D they are dependent on into R11. The remaining

attributes are kept in a relation R12. Hence, R1 is decomposed into R11 and R12 as

follows: R11 = {D, I, J}, R12 = {A, D, E} The relation R2 is similarly decomposed into R21 and R22 based on the transitive

dependency {B} -> {F} -> {G, H}:

R2 = {F, G, H}, R2 = {B, F}

The final set of relations in 3NF are {R11, R12, R21, R22, R3}

4 0
3 years ago
Consider the scenario below and determine the most likely source of the problem. A user reports that her or his printer is not r
Lina20 [59]
The answer would be D.

4 0
2 years ago
Read 2 more answers
Other questions:
  • The main benefit of encryption of a hard drive is to make part of an ROI report.
    15·1 answer
  • Ar count = 10;
    13·1 answer
  • A ____ by a design professional is used to determine the best system to provide the appropriate level and type of protection.
    6·1 answer
  • Describe a time when you influenced someone else’s knowledge around technology, whether it be an app, a new gadget, etc. What di
    14·1 answer
  • Can your digital footprint be destroyed or does it remain active on the internet forever
    5·1 answer
  • A lamp outside a front door comes on automatically when it is dark, and when someone stands on the doormat outside the front doo
    7·1 answer
  • A student that earns a well qualified score on an ap exam would receive a ___
    13·1 answer
  • Setting the isShowing property to false of the opacity property to o will delete an object from an Alice world.
    15·2 answers
  • WILL GIVE BRAINLIEST!! NO LINKS!!!
    12·2 answers
  • the php function that is executed is a connection to a database cannot be made is the____ function. die | isset| end | connect.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!