1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hoochie [10]
3 years ago
13

You can reduce the size or minimize the Ribbon. *

Computers and Technology
1 answer:
Vinvika [58]3 years ago
5 0

Answer:

minimize

Explanation:

You might be interested in
For a policy to become enforceable, it must meet five criteria, which are?
Karolina [17]

A policy must be distributed, evaluated, understood, consistent, and followed in order to be enforceable.

What is enforceable?

A legally enforceable right of set-off is one that is valid and recognized in all situations (ie enforceable both in the normal course of business and on the default, insolvency or bankruptcy of one of the counterparties).

Distribution denotes that the policy has been made accessible to all personnel for the evaluation process (through events or notification). The second condition defines the content's readability, taking into account the challenges faced by speakers of foreign languages and complex terms (using simple and precise wording to remove uncertainty).

Understanding the terms of the policy is tested through comprehension, and uniform application of the policy is assessed through consistency. Finally, compliance denotes agreement among all parties to abide by the rules.

Learn more about enforceable policy click here:

brainly.com/question/26984272

#SPJ1

8 0
2 years ago
What is the main difference between cloud computing and SaaS?
Artemon [7]

The answer is C: Cloud computing is a service, and SaaS is a platform.

Cloud computing and SaaS are closely related terms, but are different. Cloud computing consist of infrastructure and services and can be described as the delivery of computer services like, storage, databases, servers, and more over the internet. On the other hand, SaaS can refer to as a software delivery model licensed differently to on-premise applications and provide users with access to a vendor’s cloud based web applications or software.   


7 0
3 years ago
Which button do you use to put data in a specific order
3241004551 [841]
<span>arrange a list of names in alphabetical order, compile a list of product inventory levels from highest to lowest, or order rows by colors or icons</span>
8 0
3 years ago
What is the main reason for assigning roles to members of a group?
ch4aika [34]

Answer: it creates leadership and direction for the team, making it easier to work together for a common purpose.

Explanation:

The reason for assigning roles to members of a group is that it creates leadership and direction for the team, making it easier to work together for a common purpose.

When roles are delegated to the members of a group, each person gets his or her own part of the job or project. This makes it easier to work together and as a team. It also ensures that the project is handled well and faster as it creates a direction.

3 0
3 years ago
Read 2 more answers
What is a computer.<br> who made it , why they made it, and were
blsea [12.9K]
A computer helps us learn connect to people and play games the person who made it was Charles Babbage he made computers in London and it was made by 1791 to 1871 they made it so we can learn see people from far and play
5 0
3 years ago
Other questions:
  • PLEASE HELP ME ASP!!!
    11·2 answers
  • 1) Open the file DiceSimulation.java attached below. Create a new project on NetBeans called DiceSimulation. Copy the code from
    13·1 answer
  • cellPhoneBill(m,tx)Write the function cellPhoneBill()that takes two int m and txas input and returns a float.The function takes
    11·1 answer
  • Which of the following does not use a Graphic User Interface?
    14·1 answer
  • A ________ is a powerful analytical tool to size up Apple Inc.'s competitive assets in order to determine whether or not those a
    9·1 answer
  • Asymmetric key encryption combined with the information provided by a. certificate authority allows unique identification of the
    8·1 answer
  • 5.14 Describe how the compare and swap() instruction can be used to provide mutual exclusion that satisfies the bounded-waiting
    13·1 answer
  • You have been hired by a small company to install a backbone to connect four 100base-T Ethernet LANs (each using one 24-port hub
    12·1 answer
  • On a wireless network use _____ to ensure that only authorized client computers are able to access the wireless network.
    10·1 answer
  • Legends are titles given to three-axis X, Y, and Z-axis. True or false?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!