1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
timama [110]
3 years ago
13

Which ribbon tab has the tool that lets you connect your text to a URL?

Computers and Technology
1 answer:
Serjik [45]3 years ago
5 0

Answer: Insert

Explanation:

The Ribbon was introduced by Microsoft in 2017 and it's simply a user interface element that can be found below Quick Access Toolbar. The Ribbon consist of seven tabs which are:

• Home

• Insert

• Page layout

• References

• Mailing

• Review

• View.

The Ribbon tab that has the tool that lets you connect your text to a URL is the Insert tab.

In the Menu bar, the person should click on the Insert tab that us in the Links section. After that, click on the Hyperlink or the Link option, then in the Insert Hyperlink window, one can then type addr as of the web page that the person wants to connect the text to after which the leoen will then click OK.

You might be interested in
In your own words, describe UML. Identify at least two types of UML diagrams that can be used in software development; describe
lora16 [44]

<u>Uml (Unified Modified Language):</u>

In those days before software development normally we used flow chart, which will have Start, Process, Conditions and Stop, Modified version of flow chart is called UML (Unified Modified Language).

UML is standard model language which help develop understand flow of the software. Uml (Unified Modified Language).

There are 7 type of diagram is used in Uml (Unified Modified Language).

  • Class Diagram.
  • Object Diagram.
  • Component Diagram.
  • Composite Structure Diagram.
  • Deployment Diagram.
  • Package Diagram.
  • Profile Diagram.

I will suggest profile diagram and class diagram.

  • Profile diagram – This diagram is just to define use role and user rights.
  • Class diagram: - This diagram explains the class and their uses in the software development.
7 0
4 years ago
Think of a genre (science, music, math, sports, video games, etc.) and create at least 10 questions. You can decide whether you
mojhsa [17]

<em>Answer:</em>

<em>When listing to studying music or calm music it will help you considerate on a test or any home work that you are doing </em>

<em>Explanation:</em>

<em>Since 2006, two UCF professors neuroscientist Kiminobu Sugaya and world-renowned violinist Ayako Yonetani have been teaching one of the most popular courses in The Burnett Honors College. “Music and the Brain” explores how music impacts brain function and human behavior, including by reducing stress, pain and symptoms of depression as well as improving cognitive and motor skills, spatial-temporal learning and neurogenesis, which is the brain’s ability to produce neurons. Sugaya and Yonetani teach how people with neurodegenerative diseases such as Alzheimer’s and Parkinson’s also respond positively to music. </em>

<em> </em>

<em>“Usually in the late stages, Alzheimer’s patients are unresponsive,” Sugaya says. “But once you put in the headphones that play [their favorite] music, their eyes light up. They start moving and sometimes singing. The effect lasts maybe 10 minutes or so even after you turn off the music.” </em>

<em> </em>

<em>This can be seen on an MRI, where “lots of different parts of the brain light up,” he says. We sat down with the professors, who are also husband and wife, and asked them to explain which parts of the brain are activated by music.</em>

7 0
3 years ago
Which of the following is planted on an infected system and deployed at a predetermined time?A. Logic bombB. Trojan horseC. Worm
nekit [7.7K]

Answer:

A. Logic Bomb.

Explanation:

A Logic Bomb is a piece of code that is planted in a software system that is infected intentionally to set off malicious function.They are deployed at a predetermined time.

For ex:- a programmer hiding the files that deletes details of the employee who left the company.So these files can never be deleted.

4 0
3 years ago
A large data set contains information about all students majoring in computer science in colleges across the United States. The
Vsevolod [243]

Answer:

The correct option is B

B. How many states have a higher percentage of female computer science majors than male computer science majors attending college in that state?

Explanation:

A.We can not analyze that students majoring in computer science tend to have higher grade point averages than students majoring in other subjects because we are only given data sets about computer science not about other majoring subject students

B. Because data set contains attributes of gender and state so we can easily analyze that how many states have a higher percentage of female computer science majors than male computer science majors attending college in that state.

C.We can not analyze that what percent of students attending college in a certain state are majoring in computer science because data sets doesn't contain any information about students other computer science students.

D. We can not analyze that which college has the highest number of students majoring in computer science because data sets doesn't contain attribute of college name.

4 0
3 years ago
Write a function named "read_json" that takes a JSON formatted string as a parameter and return the data represented by the inpu
Lelu [443]

Answer:

Following are the program in the Python Programming Language.

import json #import package

#define function

def read_json(info):

 return json.loads(info)#load data in variable

#call and print the function

print(read_json('[{'A': 10}, {'Y': 16}, {'U': 28}]'))

<u>Output</u>:

[{'A': 10}, {'Y': 16}, {'U': 28}]

Explanation:

following are the description of the code

  • Define function "read_json()" and pass an argument "info" inside it.
  • Return the data inside from the "load()" function .
  • Call the function i.e "read_json" and passing the value to that function.
  • Print function print the data which is inside the "read_json" function.
3 0
3 years ago
Other questions:
  • Show the stack with all activation record instances, including static and dynamic chains, when execution reaches position 1 in t
    14·1 answer
  • A professor is working with five teams in his marketing research class. He decides to experiment with path-goal theory in helpin
    11·1 answer
  • When a user inserts a PivotTable, where will it be inserted?
    15·1 answer
  • An international package shipping company like FedEx needs to be able to track the location of every package at every stage in t
    9·2 answers
  • When you create new document, you have the option to create a blank document or a predifined
    7·1 answer
  • One of the greatest benefits of dual enrollment courses is that students can receive:
    15·2 answers
  • Why is it important to ensure that your software is up to date?
    13·1 answer
  • Assume that the variable data refers to the list [5, 3, 7]. Write the expressions that perform the following tasks: a. Replace t
    8·1 answer
  • Guys is there a way to watch manga in colour for free
    13·1 answer
  • As part of its commitment to sustainability, a company is looking for a way to track the source of purchased goods and how they
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!