1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Georgia [21]
2 years ago
14

What are some signs that could help you determine that a date and time was inserted as a special object instead of

Computers and Technology
1 answer:
Jlenok [28]2 years ago
3 0

Answer:

i) It is difficult to put the mouse pointer's insertion point in the text

ii) A gray border appear around the time and date when you point to it

Explanation:

When the date and time is pointed to or hovered using the mouse pointer, we have, that the background of the text changes to a grey border around the text when the date and time is inserted as a special object using the insert date and time button on the insert menu in the word processing application

The mouse pointer behaves different when working with some applications, and it could be difficult to place the insertion point of the mouse pointer in the  text

Therefore, the correct options are;

<em>It is difficult to put the mouse pointer's insertion point in the text and</em>

<em>A gray border appear around the time and date when you point to it.</em>

You might be interested in
I am trying to write a c++ program like the game typeracer. When the player starts the program he will be asked to write a sente
murzikaleks [220]
Http://www.cprogramming.com/tutorial/string.html

--------------------------------------------------------------------
6 0
3 years ago
In 3–5 sentences, describe how technology helps business professionals to be more efficient.
quester [9]

Answer:

Technology helps business professionals, keep more organized, communicate better, and effectively keeps businesses secure. Technology helps keep employee information and business paper work more organized using computers and software; while making it easier to communicate with employee's using e-mail and memo's.

Explanation:

8 0
4 years ago
Read 2 more answers
_________________: informal messages that are passed on from person to person
sasho [114]

Answer:

Grapevine is the answer

4 0
3 years ago
For risk monitoring, what are some techniques or tools you can implement in each of the seven domains of a typical IT infrastruc
Schach [20]

Answer:

 a. User Domain: Create awareness for acceptable user-policies and security risk to educate employees of pending risk.

b. Workstation Domain: Install anti-virus and constantly update the system software.

c. LAN Domain:  Access control list or ACL should be configured in routers and port security in switches to avoid hackers physically connecting to the network.

d. LAN-to-WAN Domain: Configure firewalls and intrusion detection and prevention protocols to mitigate unwanted access.

e. WAN Domain: Configure demilitarized or demarcation zone to provide secure access and prevent unwanted users from accessing network information.

f. Remote Access Domain: The use of VPNs to grant remote access to users or employees working from home and internet protocol security (IPsec) to encrypt the packet transmission.

g. Systems/Applications Domain: Administration should be well trained and ensure to get security software patches from appropriate vendors and testing them before use.

Explanation:

Risk monitoring is one of the IT infrastructure risks management plan that observes and analyzes the threats of risk in an IT infrastructure.

6 0
3 years ago
Alarm filtering may be based on combinations of frequency, the similarity in attack signature, the similarity in attack target,
Vlad [161]

Answer:

False

Explanation:

4 0
3 years ago
Other questions:
  • ISBN-13 is a new standard for identifying books. It uses 13 digits d1d2d3d4d5d6d7d8d9d10d11d12d13. The last digit d13 is a check
    9·1 answer
  • What is a method whereby new problems are solved based on the solutions from similar cases solved in the past?
    9·1 answer
  • Which of the following STEM discoverers developed a new type of computer hardware?
    11·1 answer
  • What type of data can we enter in a spreadsheet?
    11·1 answer
  • What is the order of adding 10.0 to each element in a one-dimensional array of N real numbers?
    13·1 answer
  • My computer just fried anybody know why it did that?
    14·2 answers
  • In the world of computing,accessibility MOST often refers to what
    12·1 answer
  • which of the following devices and and receive information from other device? a parallel port B serial port C video port d both
    8·1 answer
  • 3 ᴍᴜʟᴛɪᴘʟᴇ-ᴄʜᴏɪᴄᴇ Qᴜᴇꜱᴛɪᴏɴꜱ
    8·1 answer
  • Who is the best valorant character
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!