1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksana_A [137]
2 years ago
5

All Office programs have similar commands on the tab for changing the document view a. File b. View c. Locate d. display ​

Computers and Technology
1 answer:
Eva8 [605]2 years ago
3 0

Answer:

B. View

Explanation:

So you can eliminate "Locate" and "Display", since those do not exist on the Microsoft Word task bar.

Now you're left with File and View. File has everything to do with sharing and exporting your file, such as printing or saving it to your computer as a specific file.

With that being said, we're left with "B. View", which as you can see when you click it, presents many us with ways to view our document.

<u>Good luck on your Microsoft Office/Word Certification!</u>

You might be interested in
Who here would like to play among us with me? <br> Time: Friday, November 13
Ira Lisetskai [31]

Answer:

BRO I WANNA!

My among us name is "A cop"

What time?

Explanation:

8 0
3 years ago
States that processing power for computers would double every two years
hodyreva [135]

Answer:

Moore's Law

Explanation:

4 0
2 years ago
To define a c-string that will store students' last names of up to 25 characters in length, which is an appropriate statement?
kirill115 [55]
The answer is : char lastName[26];
This is the appropriate statement <span>to define a C-string that will store students' last names of up to 25 characters in length.  </span>C-string is a string whose characters are stored in consecutive memory locations, and are followed by a null character, or null terminator.
3 0
3 years ago
In computing, a(n) _____ is an attack on an information system that takes advantage of a particular system vulnerability. Select
tensa zangetsu [6.8K]

Answer: d) Exploit

Explanation: Exploit is a type computer attack that successful when the computer system of an user is vulnerable and attacker can do the exploitation. This happens due to the weakness of the system, applications software, network etc.

Other given option are incorrect because exit door,glitch and bad are not any type of attack in the computer field that causes harm to the system.Thus the correct option is option(d).

4 0
3 years ago
After execution of the following code, what will be the value of input_value if the value 0 is entered at the keyboard at run ti
katen-ka-za [31]
Cin >> input_value;
if (input_value > 5)
input_value = input_value + 5;
else if (input_value > 2)
input_value = input_value + 10;
else
input_value = input_value + 15;

The right answer is : 15
7 0
3 years ago
Other questions:
  • discuss in an essay format the steps one needs to take to develop a management information system(MIS)give examples to support y
    7·1 answer
  • A file containing user information which is transmitted from an online server and attached to your web browser and stored on you
    11·1 answer
  • Which of the following in not part of the CIA triad that is one of the cornerstones of information security? a. Confidentiality
    14·1 answer
  • What is the best way to get the most out of the box?
    14·2 answers
  • How do design elements and color work together on a web page?
    15·1 answer
  • 1) List two hardware methods that can be used to secure data
    11·1 answer
  • Plssssssssssssss help quick
    8·1 answer
  • This graphics program should draw a caterpillar. A caterpillar has NUM_CIRCLES circles. Use a for loop to draw the caterpillar,
    6·1 answer
  • Re:
    15·1 answer
  • Business Rules constraints falls into two categories:
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!