1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stella [2.4K]
3 years ago
13

Which option allows users to access the handout master to modify it?

Computers and Technology
2 answers:
julia-pushkina [17]3 years ago
4 0

Answer:

Click View and select the Handout Master tab in the ribbon.

Explanation:

i got it right on edg21

leonid [27]3 years ago
3 0

Answer:

b

Explanation:

im the goat

You might be interested in
What protocol is used to access directory listings within active directory or other directory services?
zalisa [80]

The LDAP protocol is used to access directory listings within active directory or other directory services.

LDAP stands for Lightweight Directory Access Protocol. The function of this protocol is to enale access to an existing direcory. LDAP is based on a client-server model.


3 0
4 years ago
1. Target area range is a survey of what lies about __________ seconds ahead of the vehicle. A. 5-10 B. 10-20 C. 20-30 D. 40-50
pshichka [43]

Answer:

Target area range is a survey of what lies about 12-20 seconds ahead of the vehicle. Correct Answer is B. (10-20 second)

Explanation:

Target area range is the space between your vehicle and the target area. A target area is an area on the roadway where the target is located. A target can be anything such as a car, a traffic signal, a blackhead, etc.

Target area range is also a section of roadway where the target is located and the area to the left and right of the target area

4 0
4 years ago
Read 2 more answers
What should you do when an error message pops up on the screen?
Shtirlitz [24]
The best thing to do when an error message appears when it is not supposed to, as in if you are blocked by an administrator and it appears then its supposed to, it is best to contact someone who can investigate whether or not something is happening to your computer. That could be a parent, if they are good with computers, or just tech support at a store, provided they also know computers. Most of the time your computer just makes a mistake so nothing to worry about, but make sure to have it checked just to be sure. 
7 0
3 years ago
A computer has many resources. A resource can be memory, disk drive, network bandwidth, battery power, or a monitor. It can also
bekas [8.4K]

Answer:

The security principle being referred to here is:

Resource Encapsulation.

Explanation:

Resource Encapsulation is one of the cybersecurity first principles.  It allows access or manipulation of the class data as intended by the designer. The cybersecurity first principles are the basic or foundational propositions that define the qualities of a system that can contribute to cybersecurity.  Other cybersecurity first principles, which are applied during system design, include domain separation, process isolation, modularization, abstraction, least principle, layering, data hiding, simplicity, and minimization.

7 0
3 years ago
Zahra's softball team needs money for team T-shirts. The coach makes some fundraising suggestions, while team members brainstorm
user100 [1]

Answer:

I would think it would be D

Explanation:

that's basically what it said in the passage

5 0
3 years ago
Read 2 more answers
Other questions:
  • Which sentences in the passage correctly describe a function?
    11·1 answer
  • Read the following scenario: A project will require more people than originally estimated. Identify the possible risks to the pr
    8·2 answers
  • Can you structure this code in if-statements?
    15·1 answer
  • How is a correction made to an Electronic health record?
    14·1 answer
  • The most accurate readings that you can take on an analog VOM are when the meter's pointer is at the A. center scale. B. extreme
    11·1 answer
  • Do you watch markiplier?
    13·2 answers
  • Draw a dfd that shows how data will be stored, processed, and transformed in the tims system
    9·1 answer
  • Who created fortnite
    15·2 answers
  • Can a 3048 hp motherboard support a i7 10700k cpu?
    11·2 answers
  • Write a recursive, string-valued method, reverse, that accepts a string and returns a new string consisting of the original stri
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!