1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vikki [24]
4 years ago
8

Notes page view and Outline view are found in the tab. File O Status View Page

Computers and Technology
1 answer:
monitta4 years ago
5 0

Answer:

Page view and outline view available in "View" Tab.

Explanation:

<u>Page View:</u>

<u>There are four types of page views available in word.</u>

<u>1. Normal: </u>(Useful  when we need to write more text in word)

<u>2. Web layout: </u>(Use only when we are creating a website)

<u>3. Print layout: </u>(It is used to show the left, right, top and bottom margin for printing)

<u>4. Outline View:</u> (Used to make outline of whole document)

You might be interested in
give the difference between functional and functional tools in the middle of to the circle give importance​
bija089 [108]

Answer:

hakkuna matata is the radious of a circle

5 0
3 years ago
What are the methods of gilding<br><br>nonsense will be immediately reported. ​
Luden [163]
Methods of gilding include hand application and gluing, typically of gold leaf, chemical gilding, and electroplating, the last also called gold plating. Parcel-gilt (partial gil) objects are only gilded over part of their surfaces.
6 0
2 years ago
Robin maintains a web page for updating the metro timings in the city. He would like the website to display the present day's sc
Paladinen [302]
The answer : B 4 is the value of the month that will be displayed on the web page
8 0
4 years ago
What type of attacks take advantage of vulnerabilities in poorly coded web application software to introduce malicious program c
Yakvenalex [24]

Answer:

SQL Injection

Explanation:

Coding a web application that uses a database is requiring close attention, where the developer closes any loophole any attacker may later want to exploit when the application is deployed. SQL Injection is a type of attack where the attacker places malicious code in the query statements through the form. This is possible if the input is not properly sanitized and cleaned.

5 0
3 years ago
Yuri, a medical assistant, has been asked to send an account of a patient's last office visit to another doctor's office. The te
g100num [7]
The internet,,

To let the other doctor know about specific details on the patient, and other excessive information.

Hope this helps!! :)
6 0
3 years ago
Read 2 more answers
Other questions:
  • Knowing the meaning of the acronym WYSIWYG can be most helpful to you when you
    14·1 answer
  • The number of credits awarded for the CLEP exam is determined by__<br> Help pls!
    15·1 answer
  • Question: A famous Disney Movie partially takes place in this city.
    15·2 answers
  • How did mark watney survive the accident
    9·1 answer
  • With arbitrary code execution, the ________________ launches ("spawns") a command shell from which instructions can then be issu
    11·1 answer
  • What is it called when you make a reference in the text of a document alerting the reader that you are using information from an
    10·1 answer
  • In Word, a red wavy underline indicates a/an
    15·1 answer
  • If the variable letter has been defined as a char variable, which of the following are not valid assignment statements to assign
    8·1 answer
  • Which logic correctly describes an algorithm to find the smallest of the three numbers a, b, and c and store the smallest number
    15·1 answer
  • Global address list characteristics
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!