1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vichka [17]
3 years ago
11

Write any one method to delete a table in writer​

Computers and Technology
1 answer:
strojnjashka [21]3 years ago
5 0

Answer:

To delete a table, first select the entire table. Click the “Layout” tab under “Table Tools”. Click “Delete” in the “Rows & Columns” section and select “Delete Table” to delete the table. You can also use the “Delete Columns” and “Delete Rows” options to delete the entire table as long as the entire table is selected

You might be interested in
Can someone URGENTLY help me with my java code (I WILL GIVE BRAINLIEST)!? Ive been working on it for hours and its not working!
vovikov84 [41]

Answer:

Private ListNode intel size

7 0
3 years ago
________ are viruses that masquerade as useful programs or files. hydras spyware programs worms adware programs trojan horses
Harrizon [31]
Trojan horse is the correct answer
5 0
3 years ago
What do you observe on the filter paper strip after 2 to 3 hours?
just olya [345]
Is there pictures or anything esle to read in order to figure out the answer

5 0
3 years ago
Read 2 more answers
Will a debit card still work if i put stickers on it?
laiz [17]

Answer:

Explanation:

Yes, it may still be readable, but if they refuse to take it you have no ground to stand on. (If you obscure the signature, at least make sure the CVV is readable or reprinted on top.) The plastic covering should not interfere with the mag stripe.

8 0
3 years ago
Read 2 more answers
What type of message authentication code uses hashing to authenticate the sender by using both a hash function and a secret cryp
Vesna [10]
Answer is (HMAC) Hashed Message Authentication Code

This combines authentication via a shared secret cryptography algorithm key with hashing. It involves the client and server each with a private key. The client creates a unique hash per request to the server through hashing the request with private keys.






3 0
3 years ago
Other questions:
  • What will be a fundamental aspect of future games??
    12·2 answers
  • The memory allocated for a float value is ____ bytes.
    9·1 answer
  • 1) If a client requests timestamping every two minutes, how would it look? a) [00:02:00] b) [00:06:00] c) (00:04:00)
    15·2 answers
  • Susan bought a new sweater on sale for $28.93.she was charged HST of 13%.find the total amount of her bill including taxes.​
    9·1 answer
  • Write a program that reads a file containing text. Read each line and send it to the output file, preceded by line numbers. If t
    8·1 answer
  • In which job role would a course in 3D modeling help with professional career prospects?
    9·2 answers
  • What do developers do to support software products
    14·1 answer
  • SATCOM in the Ku- and Ka- bands, as well as EHF systems are adversely affected by rain (the higher the frequency, the greater th
    14·1 answer
  • What is polymerization1​
    11·1 answer
  • PLEASE ANSWER FAST.one of the barriers for early "talkies" was the need to manually crank the projector and manually synchronize
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!