Which two tabs appear when a table is "active" in Microsoft Word?
Insert
Table Design
Home
Layout

Answers

Answer 1

Answer:

Layout and Table Design

Explanation:


Related Questions

Devices on one network can communicate with devices on another network via,
1)Multiplexer
2)Printer
3)Router
4)Hub

Answers

It is option 4 a hub cuz that is what it is used for

Answer:

3

Explanation:

philip was required to conduct training on the use of new computer systems in his company. explain two training methods that could have used.​

Answers

Instructor-led training.

eLearning.

Simulation employee training.

Hands-on training.

Coaching or mentoring.

Lectures.

Group discussion and activities.

Role-playing.

vA student found a book on the library bookshelf last week, and recorded the source information.

Book title: My Traitor’s Heart Author: Rian Malan

Publication date: 1990 Publisher: Bodley Head Publication city: London

Use the drop-down menus to indicate how the student should format this source on a works-cited list.


My Traitor’s Heart.
London:

Answers

Answer:

3,1,2,1

Explanation:

got it right on edge

have a nice day

:)

Answer:

1. Malan, Rian

2. London:

3. Bodley Head, 1990

4. Print

Explanation:

did it

Each computer on a network is called a __________, and it can include many different systems, such as desktop and laptop computers, printers, routers, switches, and cell phones.

Answers

A host refers to each of the computer system connected to a network and it include the following different systems:

Desktop Laptop computersPrintersRoutersSwitchesCell phones

What is a host?

A host can be defined as an electronic computing and programmable device that can be used to transmit and receive data (packets) over the Internet, especially when it is connected to a network.

This ultimately implies that, each electronic computing and programmable device (computer) on a particular network is a host and it can include many different systems such as:

Desktop Laptop computersPrintersRoutersSwitchesCell phones

Read more on computers here: https://brainly.com/question/17402566

characteristics of special computers​

Answers

Speed, Accuracy, Diligence, Versatility, Reliability, and Memory!

Which one of the following careers is the most highly resistant to economic change?

Video Game Designers

Airline Pilots

Fashion Designers

Funeral Attendants

Answers

Answer:

Video game designers bbbbbbbbbbbbb

1. How many colors are available in color. palette.
2. 20 colors are available in color palette. True / False​

Answers

Answer:

16 colors in the palette

false only 16 colors

It specifies the amount of memory needed to store data.

Answers

magbigay ng limang magandang lugar na tinatawag na tourist spot sa iyo sa inyong lugar o probinsya

Answer: Is it RAM? Random Access Memory

Explanation: Ram is used to reading/writing data. It might control the amount of memory that is stored.

what is the full meaning of the following acronyms:ARPANET, BOOTP, GSM, GUI, EOM, EULA, CTSS. ​

Answers

Answer:

ARPANET: Advanced Research Projects Agency Network

BOOTP: Bootstrap Protocol

GSM: Global System for Mobiles

GUI: graphical user interface

EOM: Enterprise Output Management

EULA: end-user license agreement

CTSS: The Compatible Time Sharing System

Explanation:

BEFORE GOING FOWARD KNOW THAT I DO NOT OWN THESE TEXTS.

GSM= a standard developed by the European Telecommunications Standards Institute to describe the protocols for second-generation digital cellular networks used by mobile devices such as mobile phones and tablets.

ARPANET=the first public packet-switched computer network. It was first used in 1969 and finally decommissioned in 1989. ... Many of the protocols used by computer networks today were developed for ARPANET, and it is considered the forerunner of the modern internet.

BOOTP= is an internet protocol that lets a network user automatically be configured to receive an IP address and have an operating system booted without user involvement.

GUI= A graphics-based operating system interface that uses icons, menus and a mouse (to click on the icon or pull down the menus) to manage interaction with the system.

EOM= refers to the process by which enterprise organizations manage, format and distribute data created from operational applications.

EULA= An end-user license agreement (EULA) is a license that gives a user the right to use a software application in some manner. EULAs are designed to enforce specific software use limitations, such as only using the software on one computer.

CTSS=services for children who require varying therapeutic and rehabilitative levels of intervention to address conditions of mental illness or emotional disturbance that impair and interfere with development and functioning. overcome deficits or maladaptive skills acquired over the course of a psychiatric illness.

. A binary search has a right subtree but no left subtree. What noes contains that least element in the tree

Answers

The root node will contain the smallest element

Hi! ❤️ , im looking for some help here. ill give brainliest if able to.

Answers

Answer:

I think the answer is 2

Explanation:

since your trying to search for the temperature in a specific area in New York

Choose a project with a relatively simple description (e.g. building a LAN,
designing a business web page, inventing a new communication device,
etc.). Describe your project scope in 100 words and then identify at least
five significant varied risks associated with the project. Be sure that at
least one of them is a positive risk

Answers

Answer:

Design a web page

Explanation:

It is easier html is a very easy language to learn css it should take ou about a week for a solid website

Need help with Python coding...
2.14 LAB: Using math functions
Given three floating-point numbers x, y, and z, output the square root of x, the absolute value of (y minus z) , and the factorial of (the ceiling of z).

Output each floating-point value with two digits after the decimal point, which can be achieved as follows:
print('%0.2f %0.2f %0.2f' % (your_value1, your_value2, your_value3))

Ex: If the input is:

5.0
6.5
3.2
Then the output is:

2.24 3.30 24.00

Answers

Answer:

6.5

24.00

it think it's my answer

What is considered a relatively new science that is being developed?
O targeting advertising to number of downloads
O targeting advertising to demographics
O targeting advertising to geography
O targeting advertising to adolescents

Answers

Answer:

b

Explanation:

Targeting advertising to demographics  is considered a relatively new science that is being developed. Option (b) is correct.

What do you mean by Geography?

The study of places and the interactions between people and their environs is known as geography. Geographers study the surface of the Earth and the various human societies that live there.

Advertising refers to the methods used to draw attention to a good or service. In order to attract consumers' attention, advertising seeks to highlight a good or service. It is often used to market a particular product or service, although there are many other applications as well, with commercial advertising being the most popular.

Through "branding," which links a product name or image with particular traits in consumers' minds, commercial advertising frequently aim to boost consumption of their goods or services.

Therefore, Option (b) is correct. Targeting advertising to demographics  is considered a relatively new science that is being developed.

Learn more about Geography, here;

https://brainly.com/question/1462956

#SPJ2

switches use resistors in series and parallel and can function well as digital inputs
to electronic control systems.
Select one:
O a. Proximity
O b. Smart
O C. Touch-sensitive
O d. Push button

Answers

Answer:

d push button bc it will cut all power when in off

The date of creation can be added to a slide using the:

a.

"Insert" tab, "Add note" group


b.

"Edit" group of the ribbon


c.

"Insert" tab, "Text" group

Answers

Answer:

The answer to your question is Insert tab Tex group.

The date of creation can be added to a slide by using the: "Insert" tab, "Text" group.

What is a slide?

A slide refers to a single page of a presentation that is made up of text-based information or images, which can be used by a presenter to teach, instruct and educate the audience on a topic, subject matter, event or idea.

In Microsoft Powerpoint, an end user can add the date of creation to a slide by using the "Insert" tab, "Text" group.

Read more on slides here: https://brainly.com/question/11741377

#SPJ2

What is the full form of eniac and univac ?

thanks!!​

Answers

Answer:

ENIAC - Electronic Numerical Integrator and Calculator. UNIVAC - Universal Automatic Computer (First Digital Computer)

Mark brilliant please

Answer:

[tex]ENIAC - Electronic \: Numerical \: \\ Integrator \: and \: Computer[/tex]

[tex]UNIVAC- Universal \: Automatic \: Computer[/tex]

An information of a 500GB is transferred at the speed of 10MB/s. Calculate the full time the information will be transfer.

Answers

Answer:

50,000 seconds

Explanation:

First multiply 500GB into 1000.(*1GB is equal to 1000MB so were going to multiply it so that we can get the exact MB) and we will get 500,000 MB. Then let's divide it by 10.(*since 10MB can be transfer in just one second.) and we will get 50,000 SECONDS.

Hope it can help you lovelots

What sets blockchain solutions apart from conventional record-keeping solutions?

Answers

Blockchain technology are in commonly used in this dispensation. The thing that sets blockchain solutions apart from conventional record-keeping solutions is simply the ability to share different versions of the same data to multiple parties.

Blockchain is known to buildup trust, security, transparency, and the traceability of data shared across a business network. It also minimize cost  with new efficiencies.

It is simply known to be distributed ledger technology that helps in the storage of information in the form of blocks and no one can change or add the data.

See full question below

What sets blockchain solutions apart from conventional record-keeping solutions?

the ability for multiple parties to be certain they are using the same data

the ability to share different versions of the same data to multiple parties

a focus and priority on bitcoin and cryptocurrency

a system that maintains rigor and complexity

Learn more from

https://brainly.com/question/21105181

Online Book Merchants offers premium customers 1 free book with every purchase of 5 or more books and offers 2 free books with every purchase of 8 or more books. It offers regular customers 1 free book with every purchase of 7 or more books, and offers 2 free books with every purchase of 12 or more books.

Write a statement that assigns freeBooks the appropriate value based on the values of the bool variable isPremiumCustomer and the int variable nbooksPurchased. Assign 0 to freeBooks if no free books are offered. Assume the variables freeBooks, isPremiumCustomer, and nbooksPurchased are already declared.

In C++ please

Answers

fill in the blanks

we should our selves

How do you create speaker note changes that show the slides, related notes and company logo on each page

Answers

Answer:

The Notes Master contains two placeholders one for your text and the other for the slide. We can move or change the size of either of these objects and we can change the format of the text in the notes placeholder, we can also add or change elements that we want to appear on each handout and also notice the convenient placement of the header, footer, date and page numbers.

An application maintains social security numbers and birth dates in a database to track medical records across multiple offices. To maintain the personally identifiable information (PII), which of the following de-identification methods should the application adopt?

Answers

There are different ways of management.  To maintain the personally identifiable information (PII), Data masking as an de-identification methods should the application adopted.

Data masking is also called data obfuscation. This is simply known as the way of improving or modifying sensitive data so that it has no/little value to unauthorized intruders while still being usable by software or authorized personnel.

It often functions by shielding confidential data, such as credit card information, Social Security numbers, names, addresses, and phone numbers etc.

Learn more from

https://brainly.com/question/13438921

what does project manager do?

Answers

project managers (PMs) are responsible for planning, organizing, and directing the completion of specific projects for an organization while ensuring these projects are on time, on budget, and within scope.

Suppose you are in charge of unloading containers from ships arriving at a port onto trucks. A ship arrives with n containers of weight w1, w2, . . . , wn tons. Standing on the dock is a set of trucks, each of which can hold 1 ton of weight. (You can assume that none of the containers weighs more than 1 ton, since in this case you would not be able to transport it.) You can stack multiple containers in each truck subject to the weight restriction of 1 ton. Hoping to minimize your truck rental expenses, you aim to minimize the number of trucks needed in order to carry all the containers.

You start with the following greedy strategy. Start with an empty truck and begin loading containers 1, 2, 3, ... onto it until you get to a container that would overflow the weight limit. Now, declare this truck "loaded" and send it off; then continue the process with a fresh truck. After trying (and failing) to prove that this greedy algorithm is optimal, you decide to attempt to come up with a counter-example to see if you can discover that your strategy is not optimal.

Required:
Provide an example of a set of weights for which your algorithm does not use the minimum possible number of trucks.

Answers

Answer:

i thinks a , i hope it help you

Explanation:

1. Briefly summarize the similarities and differences among temporary staffing firms, employee leasing organizations, and professional employment organizations. Which approach pro- vides an organization the most protection from potential coemployment situations?

Answers

A staffing firm simply refers to an organization that matches companies and job candidates. It's also known as a recruiting firm.

It should be noted that employers use staffing agencies to help recruit candidates for them and to fill certain job openings.

An employee leasing organization furnishes workers to another client on a long-term basis. It's usually a contractual agreement between the parties that are involved.

A professional employer organization simply means an organization that enters into a joint employer relationship with another employer by leasing employees to the employer.

The organization that typically gives protection from potential coemployment situations is the temporary staffing firms.

Read related link on:

https://brainly.com/question/25747300

What is true about client-side scripting?

Answers

Answer:

A client-side script is a program that is processed within the client browser. These kinds of scripts are small programs which are downloaded , compiled and run by the browser. JavaScript is an important client-side scripting language and widely used in dynamic websites.

Explanation:

Client-side scripting refers to the execution of scripts on the client's device (typically in a web browser) rather than on the server.

Given that,

To write about client-side scripting.

Since, Client-side scripting simply means running scripts, such as JavaScript, on the client device, usually within a browser.

All kinds of scripts can run on the client side if they are written in JavaScript because JavaScript is universally supported.

Therefore, client-side scripting enables the execution of scripts on the client's device, enhancing web interactivity and reducing server load.

JavaScript is a widely used language for client-side scripting.

To learn more about scripting visit:

https://brainly.com/question/26121358

#SPJ4

A function getints has been defined that has no parameters and returns an array of integer values. The first value in the array contains the total number of items in the array (including itself). Write code (not a function or main) to: Write a prototype for getints() Call getints() From the resulting array, print the first value (after the length) and the last value, each on a separate line.

Answers

Answer:

Explanation:In the below code : Create method getints() : with no arguments and integer array return type Inside method : Declare n integer Input n Declare integer array with n length : arrInt Assign n at 0th array index Use loop from 1 to n: i counter Input arr... view the full answer

Function getints  is presented in the Prototype of the following code will be:

// Prototype

int* getints();

What is function getints?

This function requests an integer from the person using it and then returns it. You can ask for the integer using a prompt argument.

Older OSes used the C method getch() to collect user input. Depending on the function call, it only allows one input character at a time. Unless the user supplies input, the program's execution is halted.

For trhe Prototype the code will be:

// Prototype

int* getints();

For the getints the code will be:

// Call getints()

int* array = getints();

The print values will be:

// Print the first and last value

printf("The first value is %d\n", array[1]);

printf("The last value is %d\n", array[array[0]]);

Learn more about  function getints, here:

https://brainly.com/question/30928705

#SPJ2

write a Assembly Language program that copies only unsigned numbers from Array1 to another Array2. The Array1 has both signed and unsigned numbers.
Array1 = { -4,-1,-2,-1,0,1,2,3,4 }

Answers

Unsigned numbers do not have preceeding positive or negative signs. Hence, the program written in python 3 copies unsigned values in the given array to another array thus :

array1 = {-4,-1,-2,-1,0,1,2,3,4 }

#assigns a set of values to array 1

array2 = set()

#initialize an empty array

for ele in array1 :

#loop through the values in array1

if ele >= 0 :

#since the signed values are negative, checks for values greater than or equal to 0

array2.add(ele)

#add to array 2

print(array2)

A sample run of the program is attached.

Learn more : https://brainly.com/question/25706522

The operating system called Windows 7 is typically used for _____ a. Laptop computers b. Super computer c. All of the options d. Desktop computers​

Answers

Answer:

all of these

Explanation:

,,,,,,,,,,,,,,,,

The operating system called Windows 7 is typically used for C All of these.

An operating system simply means a collection of programs that is vital for coordinating the operations of the computer software and hardware.

It should be noted that the operating system called Windows 7 is typically used for laptop computers, super computer, and desktop computers.

Therefore, the correct option is All of these.

Read related link on:

https://brainly.com/question/17252990

A keyboard would be considered _____. Select 2 options.

an input device

storage

an output device

software

hardware

Answers

Answer:

input devise and hardware

Explanation:

Other Questions
help with these questions pls HELP ITS TIMED AND IM STUCK ONE THIS QUESTION Help help help help help help help Which theorem does it offer proof of? what is not an example of a changing operating space? help ??? on edu math review y=1/2x+4y=-2x+9elmantion or substutuion method select the two adverbs in this sentence: can the newly elected governor successfully convince the legislature to support her costly education program? What does the Fourth of July represent to African American living in the 1850s What is theme of this song, Let It Go?A. Do not worry about what others think of you.B. Don't be greedy.C. Be honest How can a video better help understand a topic better than a book? Ano ang aral na makukuha sa akdang ang munting prinsipe Which of the following describes the Japanese position just prior to the bombing of Hiroshima?A. Japan had steadfastly refused to surrender and continued to expand its territory in Asia.B. Japan had steadfastly refused to surrender and prepared for a direct invasion by the United States.C. Japan had offered to surrender on the condition that it retain various colonies overseas.D. Japan had offered to surrender on the condition that the emperor remains head of state. List two reasons why an individual may want to consider where their food is coming from.... (meats, veggies, fruits, etc.) PLZ HELP ME I NEED IT ANSWERED NOW Which expression is equivalent to 21 x + 35 y 14 = 0?y = x + 2B y = x 7C y = -x + 14D 3x + 5y = 2 A kayak is originally priced at $130. The online retailer vives a Discount and the kayak is now priced at $65. Enter the porcentaje Discount for the cost of the kayak what is the number name of (i)46,25,689and (ii)658,902,250 Evaluate the expression for b= 12 What type of mixture is this illustration?