1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valina [46]
3 years ago
11

Which Tab provides the command to add a hyperlink to a document?

Computers and Technology
2 answers:
Cloud [144]3 years ago
8 0

Answer: The answer is Insert

Explanation:

Natali [406]3 years ago
7 0

Answer:

I love it is your responsibility is accepted the second one was for the database reply to your account we should wear the same same Dp xd I have tow bar is the only one hour u

You might be interested in
Rows within a spreadsheet are identified by:
EleoNora [17]

Answer:

Option C: Numbers.

Explanation:

By default, rows within a spreadsheet are identified by Numbers i.e. 1,2,3,............

Total rows are 1048575 in one spreadsheet.

7 0
4 years ago
Joshua wants to be a lawyer. He found the following table on the Bureau of Labor Statistics’ website to find out about the emplo
mars1129 [50]

The answer to your question is,

C) The number of lawyers will increase, so it may be difficult to find a job.

-Mabel <3

3 0
4 years ago
Read 2 more answers
1. Which sentence best expresses the main idea
Neko [114]
B is the answer

Hope this helps




3 0
3 years ago
Who was responsible for unleashing the melissa computer virus
CaHeK987 [17]

Answer:

David L. Smith

Explanation:

Around March 26, 1999, the Melissa virus was released by David L. Smith

‘Melissa.A’ used social engineering techniques, since it came with the message “Here is the document you asked me for…  do not show it to anyone”. In just a few days, she starred in one of the most important cases of massive infection in history, causing damage of more than 80 million dollars to American companies. Companies like Microsoft, Intel and Lucent Technologies had to block their Internet connections due to its action.

How it Works

When opening a document infected with the ‘Melissa.A’, the virus creates an e-mail with the following features:

Subject: Important Message From “sender name”

Text: Here is that document you asked for … do not show anyone else

Attachments: a file with a DOC.

The recipients of this message were the first 50 addresses ‘Melissa.A’ found in the address book in Outlook. This was the first macro virus that used this technique, until this moment there hadn’t been a virus that affected users by sending a Word document within an email.

What Happened

The creator of ‘Melissa.A’, David L. Smith, pleaded guilty but said he did not expect such high economic damage. This malware was created in memory of a topless dancer in Florida with whom he had fallen in love with.

Smith was sentenced to 10 years in prison.

6 0
3 years ago
Explain briefly why we say that the "Web" exists only in our minds.
hammer [34]

Answer:

The Web is the system of web pages and sites that uses the Internet to pass the files across. It was developed in the late 1980’s by Tim Berners-Lee, and you <em>need a Web Browser to access it</em>. This could either be in a PC, a mobile phone or one of the new iPods.

Explanation:

I guess you could look at it as just one of many services that use the Internet – other services include e-mail, internet telephony and peer-to-peer file transfers. Hope this helps ^-^

4 0
3 years ago
Other questions:
  • Wharton professor Jerry Wind "believe[s] that digital networks are the key differentiator, [and] enable new forms of sharing, di
    9·1 answer
  • Whats the 7 internal components found in a computer tower
    11·1 answer
  • What are two reasons network devices are typically accessed through a cli?
    12·1 answer
  • A compound document contains _______ from different applications.
    12·2 answers
  • What is the name of the malware included in CCleaner?
    13·1 answer
  • Which letter indicates the amplitude of the wave?<br> a. A<br> b. B<br> c. C<br> d. D
    12·1 answer
  • Rob Janoff believes that technology should not be used too
    11·1 answer
  • Write a function called "power" that takes in integers b&gt;0 and e≥0 and recursively computes b^3 and returns the result.
    5·2 answers
  • True false) cad means computer aided manufacturing​
    10·1 answer
  • What is the function of control unit? in computer. <br>​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!