1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuliya22 [10]
3 years ago
14

Which tab provides you options like inserting a table, inserting a shape, or adding Audio/Video?

Business
1 answer:
REY [17]3 years ago
7 0

Answer:

The insert tab

Explanation:

You might be interested in
How soon following the occurrence of a covered loss must an insured submit written proof of such loss to the insurance company?
dolphi86 [110]

Answer:

The answer is: Within 90 days; about 3 months.

6 0
3 years ago
What do stocks and bonds do?
denpristay [2]

Answer:

stock our for day trading bonds and trading ways thier divided stacks for long term passive income bonds are more safer investment though will be accped by any bank without qeoutions

8 0
3 years ago
In the demand-withdraw interaction pattern, the person who asks for the change is the
goblinko [34]
Demander is the answer :)
7 0
3 years ago
You are studying in your dorm room, but your neighbor is blasting the television in the adjacent room. when you gently request t
DiKsa [7]

I guess the correct answer is absolute threshold

You are studying in your dorm room, but your neighbor is blasting the television in the  adjacent room. When you gently request that your neighbor turn the volume down until you  cannot hear it, you are asking your neighbor to make the volume less than your absolute threshold.

6 0
3 years ago
Phishing:_______
grandymaker [24]

Answer:

a)

Explanation:

Phishing is a type of deception in which an intruder disguises himself in email or other means of communication as a reputable individual or person. Attackers would normally use phishing e-mails to spread a range of malicious links or attachments. Some people will gather login credentials or victims' account details.

So as per above definition only option A seems the correct alternative among al the other option when discussing about Phishing.

A con executed using technology, typically targeted at acquiring sensitive information, or tricking someone into installing malicious software.

7 0
3 years ago
Other questions:
  • Bob and Tom are two criminals who have been arrested for burglary. The police put Tom and Bob in separate cells. They offer to l
    10·1 answer
  • What economies are driven by supply and demand?
    9·1 answer
  • Q 7.28: A multi-location flower shop receives payment from customers in person, over the Internet, and through the mail. When ch
    12·1 answer
  • Designer Dollhouses manufactures dollhouse kits that are meant to be assembled by customers. Each kit sells for $60 and has $12
    15·1 answer
  • Employees working in the petroleum industry in Alaska might be receiving higher wages based on the fact that their careers requi
    9·2 answers
  • The existence of "beaten paths" tends to discourage immigration because of the perception that job prospects have been exhausted
    5·1 answer
  • Which statement best describes the economic relationship between
    11·1 answer
  • In September, you made a profit of $5,456,963 with expenses of $2,456,654. What was your total revenue?
    8·2 answers
  • A person that studies how economic theories such as capitalism, socialism, and
    10·1 answer
  • STATE THE TOP TEN MOST GORGEOUS RUSSIAN ACTRESSES.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!