1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MA_775_DIABLO [31]
2 years ago
9

Any one know :) please

Computers and Technology
1 answer:
aliina [53]2 years ago
8 0

Answer:

C. Adds a link through the text (strikethrough)

Explanation:

I did this before lol

You might be interested in
Which of the following is opened when the Find command is clicked? Question 9 options: Navigation Pane Insert Hyperlink dialog b
Dima020 [189]

The element, from the following options, which is opened when the find command is clicked is the search pane.

What is find command?

Find command is the command which is used to find the list of files and their location.

Find command can be used in different manners-

  • To find the different files in a system.
  • Find command can find the files by their name, size, date or other information related to the required document.
  • This command can be modified with the requirement of the search.

The options for the given problem are-

  • Navigation Pane Insert- It is used to show the navigation pane in word or similar space.
  • Hyperlink dialog box-This open, when the insert hyperlink command is clicked.
  • Bookmark dialog box-This opens, when the bookmark command is clicked.
  • Search Pane- Search pane is opens, when the find commond is clicked.

Thus, the element, from the following options, which is opened when the find command is clicked is the search pane.

Learn more about the find command here:

brainly.com/question/25243683

4 0
2 years ago
Three variables, x, y and z, supposedly hold strings of digits, suitable for converting to integers. Write code that converts th
Gelneren [198K]
The answer is 45boobg
3 0
3 years ago
Read 2 more answers
Computer security experts devote their time and energy to the protection of sensitive data and the prevention of an outside atta
Alik [6]

Answer:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

Explanation:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

An information security policy are set of rules/policies designed to guide employees for the protection of the security of company information and IT systems. The reasons for these policies are:

  1. It defines what is required from organization’s employees for the security of the IT systems
  2. Information security policies provide a means to secure the organization against external and internal threats
  3. Information security policies are a mechanism to for ensuring an organization’s legal and ethical responsibilities
  4. Information security policies are created to hold each employee responsible with regard to information security
4 0
3 years ago
Which of the following contains fair use?
Reptile [31]
The answer to your question is D
8 0
3 years ago
Melissa is writing a class called Cell. Which method has she set up to return a double?
Alina [70]

Answer:

C. public double get_mCount()

5 0
3 years ago
Other questions:
  • A disadvantage of creating a website with tables, without CSS is
    15·2 answers
  • The section called Breaking Substitution Ciphers (p. 166) describes a "random substitution cipher," in which each letter of the
    11·1 answer
  • Which of the following is not a good technique for photographing groups? Visiting the location.
    9·1 answer
  • A parameter is a numerical measure that describes a characteristic of a sample. Choose One • 4 points True False
    6·1 answer
  • 1. Zack sees an online contest. He could win $10,000 instantly! On the sign-up form, he enters his name and email address. He is
    15·1 answer
  • 1. cybersquatting refers to the tampering of existing web sites and selling unrelated products (true or false)
    8·1 answer
  • Nonverbal communication includes _____.
    9·2 answers
  • Running the Disk Cleanup utility is a quick way to ________. Group of answer choices defrag your hard drive remove spyware progr
    10·1 answer
  • How to beat level 50 in give up robot 2
    5·1 answer
  • Я люблю есть гнезда петух
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!